Action not permitted
Modal body text goes here.
cve-2022-22628
Vulnerability from cvelistv5
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:21:48.824Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT213182" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT213193" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT213183" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT213186" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.apple.com/en-us/HT213187" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Safari", "vendor": "Apple", "versions": [ { "lessThan": "15.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "tvOS", "vendor": "Apple", "versions": [ { "lessThan": "15.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "tvOS", "vendor": "Apple", "versions": [ { "lessThan": "12.3", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "tvOS", "vendor": "Apple", "versions": [ { "lessThan": "15.4", "status": "affected", "version": "unspecified", "versionType": "custom" } ] }, { "product": "watchOS", "vendor": "Apple", "versions": [ { "lessThan": "8.5", "status": "affected", "version": "unspecified", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "value": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution." } ], "problemTypes": [ { "descriptions": [ { "description": "Processing maliciously crafted web content may lead to arbitrary code execution", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-23T18:58:31", "orgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "shortName": "apple" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT213182" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT213193" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT213183" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT213186" }, { "tags": [ "x_refsource_MISC" ], "url": "https://support.apple.com/en-us/HT213187" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2022-22628", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Safari", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "15.4" } ] } }, { "product_name": "tvOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "15.4" } ] } }, { "product_name": "tvOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "12.3" } ] } }, { "product_name": "tvOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "15.4" } ] } }, { "product_name": "watchOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.5" } ] } } ] }, "vendor_name": "Apple" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Processing maliciously crafted web content may lead to arbitrary code execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/en-us/HT213182", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT213182" }, { "name": "https://support.apple.com/en-us/HT213193", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT213193" }, { "name": "https://support.apple.com/en-us/HT213183", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT213183" }, { "name": "https://support.apple.com/en-us/HT213186", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT213186" }, { "name": "https://support.apple.com/en-us/HT213187", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT213187" } ] } } } }, "cveMetadata": { "assignerOrgId": "286789f9-fbc2-4510-9f9a-43facdede74c", "assignerShortName": "apple", "cveId": "CVE-2022-22628", "datePublished": "2022-09-23T18:58:31", "dateReserved": "2022-01-05T00:00:00", "dateUpdated": "2024-08-03T03:21:48.824Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-22628\",\"sourceIdentifier\":\"product-security@apple.com\",\"published\":\"2022-09-23T19:15:11.080\",\"lastModified\":\"2024-11-21T06:47:08.967\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution.\"},{\"lang\":\"es\",\"value\":\"Se abord\u00f3 un problema de uso de memoria previamente liberada con una administraci\u00f3n de memoria mejorada. Este problema ha sido corregido en macOS Monterey versi\u00f3n 12.3, Safari versi\u00f3n 15.4, watchOS versi\u00f3n 8.5, iOS versi\u00f3n 15.4 y iPadOS versi\u00f3n 15.4, tvOS versi\u00f3n 15.4. El procesamiento de contenido web dise\u00f1ado de forma maliciosa puede conllevar a una ejecuci\u00f3n de c\u00f3digo arbitrario.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-416\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.4\",\"matchCriteriaId\":\"2B5E9A8F-FFF6-432A-9E8A-074B53B29507\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.4\",\"matchCriteriaId\":\"304F5E03-FD61-453E-B2C5-FC3A2E30E448\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.4\",\"matchCriteriaId\":\"1E4C3F0C-E368-4F79-B42E-E5EB0FB5E767\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"12.0\",\"versionEndExcluding\":\"12.3\",\"matchCriteriaId\":\"9C72309C-939F-4744-80DB-07C4452BDAFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"15.4\",\"matchCriteriaId\":\"70A2E262-1C91-4030-A2D5-E089C271EA34\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.5\",\"matchCriteriaId\":\"17C8B971-2F25-4961-B1AF-F4AAB1848990\"}]}]}],\"references\":[{\"url\":\"https://support.apple.com/en-us/HT213182\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213183\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213186\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213187\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213193\",\"source\":\"product-security@apple.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213182\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213183\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213186\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213187\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://support.apple.com/en-us/HT213193\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
ghsa-f8p7-rhpm-pg98
Vulnerability from github
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution.
{ "affected": [], "aliases": [ "CVE-2022-22628" ], "database_specific": { "cwe_ids": [ "CWE-416" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2022-09-23T19:15:00Z", "severity": "HIGH" }, "details": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution.", "id": "GHSA-f8p7-rhpm-pg98", "modified": "2022-09-29T00:00:27Z", "published": "2022-09-25T00:00:16Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628" }, { "type": "WEB", "url": "https://support.apple.com/en-us/HT213182" }, { "type": "WEB", "url": "https://support.apple.com/en-us/HT213183" }, { "type": "WEB", "url": "https://support.apple.com/en-us/HT213186" }, { "type": "WEB", "url": "https://support.apple.com/en-us/HT213187" }, { "type": "WEB", "url": "https://support.apple.com/en-us/HT213193" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
rhsa-2022_8054
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nSecurity Fix(es):\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)\n\n* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)\n\n* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.1 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:8054", "url": "https://access.redhat.com/errata/RHSA-2022:8054" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.1_release_notes/index" }, { "category": "external", "summary": "2061996", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061996" }, { "category": "external", "summary": "2073893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893" }, { "category": "external", "summary": "2073896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896" }, { "category": "external", "summary": "2073899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899" }, { "category": "external", "summary": "2082548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548" }, { "category": "external", "summary": "2092732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732" }, { "category": "external", "summary": "2092733", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733" }, { "category": "external", "summary": "2092734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734" }, { "category": "external", "summary": "2092735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735" }, { "category": "external", "summary": "2092736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736" }, { "category": "external", "summary": "2104787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787" }, { "category": "external", "summary": "2104789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_8054.json" } ], "title": "Red Hat Security Advisory: webkit2gtk3 security and bug fix update", "tracking": { "current_release_date": "2024-11-22T19:07:05+00:00", "generator": { "date": "2024-11-22T19:07:05+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:8054", "initial_release_date": "2022-11-15T13:26:22+00:00", "revision_history": [ { "date": "2022-11-15T13:26:22+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-15T13:26:22+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T19:07:05+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:9::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.36.7-1.el9.src", "product": { "name": "webkit2gtk3-0:2.36.7-1.el9.src", "product_id": "webkit2gtk3-0:2.36.7-1.el9.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.36.7-1.el9.aarch64", "product": { "name": "webkit2gtk3-0:2.36.7-1.el9.aarch64", "product_id": "webkit2gtk3-0:2.36.7-1.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "product": { "name": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "product": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "product": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "product": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.36.7-1.el9.ppc64le", "product": { "name": "webkit2gtk3-0:2.36.7-1.el9.ppc64le", "product_id": "webkit2gtk3-0:2.36.7-1.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "product": { "name": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "product": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "product": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "product": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.36.7-1.el9.i686", "product": { "name": "webkit2gtk3-0:2.36.7-1.el9.i686", "product_id": "webkit2gtk3-0:2.36.7-1.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.36.7-1.el9.i686", "product": { "name": "webkit2gtk3-devel-0:2.36.7-1.el9.i686", "product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "product": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "product": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "product": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "product": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.36.7-1.el9.x86_64", "product": { "name": "webkit2gtk3-0:2.36.7-1.el9.x86_64", "product_id": "webkit2gtk3-0:2.36.7-1.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "product": { "name": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "product": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "product": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "product": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "webkit2gtk3-0:2.36.7-1.el9.s390x", "product": { "name": "webkit2gtk3-0:2.36.7-1.el9.s390x", "product_id": "webkit2gtk3-0:2.36.7-1.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el9?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "product": { "name": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "product_id": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el9?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "product": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "product_id": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el9?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "product": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el9?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "product": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el9?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "product": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el9?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el9?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el9?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el9?arch=s390x" } } } ], "category": "architecture", "name": "s390x" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64" }, "product_reference": "webkit2gtk3-0:2.36.7-1.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686" }, "product_reference": "webkit2gtk3-0:2.36.7-1.el9.i686", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le" }, "product_reference": "webkit2gtk3-0:2.36.7-1.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x" }, "product_reference": "webkit2gtk3-0:2.36.7-1.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.36.7-1.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src" }, "product_reference": "webkit2gtk3-0:2.36.7-1.el9.src", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64" }, "product_reference": "webkit2gtk3-0:2.36.7-1.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le" }, "product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x" }, "product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64" }, "product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le" }, "product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x" }, "product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64" }, "product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686" }, "product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.i686", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le" }, "product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x" }, "product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64" }, "product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le" }, "product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x" }, "product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "relates_to_product_reference": "AppStream-9.1.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)", "product_id": "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64", "relates_to_product_reference": "AppStream-9.1.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22624", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073893" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22624" }, { "category": "external", "summary": "RHBZ#2073893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22624", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22624" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8054" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-22628", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073896" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22628" }, { "category": "external", "summary": "RHBZ#2073896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22628", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22628" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8054" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-22629", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-11T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073899" } ], "notes": [ { "category": "description", "text": "A buffer overflow vulnerability was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Buffer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22629" }, { "category": "external", "summary": "RHBZ#2073899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8054" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Buffer overflow leading to arbitrary code execution" }, { "cve": "CVE-2022-22662", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104787" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where an issue occurs due to improper cookie management. This flaw allows a remote attacker to trick the victim into parsing maliciously crafted web content, triggering the vulnerability and gaining access to potentially sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Cookie management issue leading to sensitive user information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22662" }, { "category": "external", "summary": "RHBZ#2104787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22662", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22662" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0006.html", "url": "https://webkitgtk.org/security/WSA-2022-0006.html" } ], "release_date": "2022-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8054" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Cookie management issue leading to sensitive user information disclosure" }, { "cve": "CVE-2022-26700", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092732" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26700" }, { "category": "external", "summary": "RHBZ#2092732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26700", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26700" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8054" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-26709", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092733" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26709" }, { "category": "external", "summary": "RHBZ#2092733", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26709", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26709" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8054" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26710", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-07-07T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104789" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in WebKitGTK. The flaw occurs when processing maliciously crafted HTML content in WebKit. This flaw allows a remote attacker to trick the victim into visiting a specially crafted website, triggering memory corruption and executing arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26710" }, { "category": "external", "summary": "RHBZ#2104789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26710", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0006.html", "url": "https://webkitgtk.org/security/WSA-2022-0006.html" } ], "release_date": "2022-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8054" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26716", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092734" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26716" }, { "category": "external", "summary": "RHBZ#2092734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26716", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8054" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-26717", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092735" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26717" }, { "category": "external", "summary": "RHBZ#2092735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8054" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26719", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092736" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26719" }, { "category": "external", "summary": "RHBZ#2092736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26719", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8054" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-30293", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-05-06T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2082548" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow vulnerability was found in WebKitGTK. The vulnerability occurs when processing or rendering HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a heap buffer overflow error and leading to the execution of arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30293" }, { "category": "external", "summary": "RHBZ#2082548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30293", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30293" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293" } ], "release_date": "2022-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8054" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution" }, { "cve": "CVE-2022-32792", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238973" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkit. This issue occurs when processing maliciously crafted web content which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32792" }, { "category": "external", "summary": "RHBZ#2238973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32792", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32792" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2022-0007.html", "url": "https://wpewebkit.org/security/WSA-2022-0007.html" } ], "release_date": "2022-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8054" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2022-32816", "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238975" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkit. This issue occurs when visiting a website that frames malicious content, which may lead to UI spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: malicious content may lead to UI spoofing", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32816" }, { "category": "external", "summary": "RHBZ#2238975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32816", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2022-0007.html", "url": "https://wpewebkit.org/security/WSA-2022-0007.html" } ], "release_date": "2022-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8054" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: malicious content may lead to UI spoofing" }, { "cve": "CVE-2022-32891", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128647" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: UI spoofing while Visiting a website that frames malicious content", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32891" }, { "category": "external", "summary": "RHBZ#2128647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32891", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32891" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0009.html", "url": "https://webkitgtk.org/security/WSA-2022-0009.html" } ], "release_date": "2022-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-15T13:26:22+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:8054" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.src", "AppStream-9.1.0.GA:webkit2gtk3-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el9.x86_64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.aarch64", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.i686", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.ppc64le", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.s390x", "AppStream-9.1.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el9.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: UI spoofing while Visiting a website that frames malicious content" } ] }
rhsa-2022_7704
Vulnerability from csaf_redhat
Notes
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "An update for glib2 and webkit2gtk3 is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.", "title": "Topic" }, { "category": "general", "text": "WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.\n\nGLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.\n\nSecurity Fix(es):\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22624)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-22628)\n\n* webkitgtk: Buffer overflow leading to arbitrary code execution (CVE-2022-22629)\n\n* webkitgtk: Cookie management issue leading to sensitive user information disclosure (CVE-2022-22662)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26700)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26709)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26710)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26716)\n\n* webkitgtk: Use-after-free leading to arbitrary code execution (CVE-2022-26717)\n\n* webkitgtk: Memory corruption issue leading to arbitrary code execution (CVE-2022-26719)\n\n* webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution (CVE-2022-30293)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2022:7704", "url": "https://access.redhat.com/errata/RHSA-2022:7704" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index", "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index" }, { "category": "external", "summary": "2061994", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2061994" }, { "category": "external", "summary": "2073893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893" }, { "category": "external", "summary": "2073896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896" }, { "category": "external", "summary": "2073899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899" }, { "category": "external", "summary": "2082548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548" }, { "category": "external", "summary": "2092732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732" }, { "category": "external", "summary": "2092733", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733" }, { "category": "external", "summary": "2092734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734" }, { "category": "external", "summary": "2092735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735" }, { "category": "external", "summary": "2092736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736" }, { "category": "external", "summary": "2099334", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2099334" }, { "category": "external", "summary": "2104787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787" }, { "category": "external", "summary": "2104789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2022/rhsa-2022_7704.json" } ], "title": "Red Hat Security Advisory: webkit2gtk3 security and bug fix update", "tracking": { "current_release_date": "2024-11-22T19:06:55+00:00", "generator": { "date": "2024-11-22T19:06:55+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2022:7704", "initial_release_date": "2022-11-08T09:56:52+00:00", "revision_history": [ { "date": "2022-11-08T09:56:52+00:00", "number": "1", "summary": "Initial version" }, { "date": "2022-11-08T09:56:52+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T19:06:55+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product": { "name": "Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8::baseos" } } }, { "category": "product_name", "name": "Red Hat CodeReady Linux Builder (v. 8)", "product": { "name": "Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::crb" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product": { "name": "Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA", "product_identification_helper": { "cpe": "cpe:/a:redhat:enterprise_linux:8::appstream" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "glib2-0:2.56.4-159.el8.src", "product": { "name": "glib2-0:2.56.4-159.el8.src", "product_id": "glib2-0:2.56.4-159.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=src" } } }, { "category": "product_version", "name": "webkit2gtk3-0:2.36.7-1.el8.src", "product": { "name": "webkit2gtk3-0:2.36.7-1.el8.src", "product_id": "webkit2gtk3-0:2.36.7-1.el8.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "glib2-0:2.56.4-159.el8.aarch64", "product": { "name": "glib2-0:2.56.4-159.el8.aarch64", "product_id": "glib2-0:2.56.4-159.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=aarch64" } } }, { "category": "product_version", "name": "glib2-devel-0:2.56.4-159.el8.aarch64", "product": { "name": "glib2-devel-0:2.56.4-159.el8.aarch64", "product_id": "glib2-devel-0:2.56.4-159.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=aarch64" } } }, { "category": "product_version", "name": "glib2-fam-0:2.56.4-159.el8.aarch64", "product": { "name": "glib2-fam-0:2.56.4-159.el8.aarch64", "product_id": "glib2-fam-0:2.56.4-159.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-fam@2.56.4-159.el8?arch=aarch64" } } }, { "category": "product_version", "name": "glib2-tests-0:2.56.4-159.el8.aarch64", "product": { "name": "glib2-tests-0:2.56.4-159.el8.aarch64", "product_id": "glib2-tests-0:2.56.4-159.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-tests@2.56.4-159.el8?arch=aarch64" } } }, { "category": "product_version", "name": "glib2-debugsource-0:2.56.4-159.el8.aarch64", "product": { "name": "glib2-debugsource-0:2.56.4-159.el8.aarch64", "product_id": "glib2-debugsource-0:2.56.4-159.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=aarch64" } } }, { "category": "product_version", "name": "glib2-debuginfo-0:2.56.4-159.el8.aarch64", "product": { "name": "glib2-debuginfo-0:2.56.4-159.el8.aarch64", "product_id": "glib2-debuginfo-0:2.56.4-159.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=aarch64" } } }, { "category": "product_version", "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "product": { "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=aarch64" } } }, { "category": "product_version", "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "product": { "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=aarch64" } } }, { "category": "product_version", "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "product": { "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=aarch64" } } }, { "category": "product_version", "name": "glib2-static-0:2.56.4-159.el8.aarch64", "product": { "name": "glib2-static-0:2.56.4-159.el8.aarch64", "product_id": "glib2-static-0:2.56.4-159.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-0:2.36.7-1.el8.aarch64", "product": { "name": "webkit2gtk3-0:2.36.7-1.el8.aarch64", "product_id": "webkit2gtk3-0:2.36.7-1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "product": { "name": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "product": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "product": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "product": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=aarch64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=aarch64" } } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "glib2-0:2.56.4-159.el8.ppc64le", "product": { "name": "glib2-0:2.56.4-159.el8.ppc64le", "product_id": "glib2-0:2.56.4-159.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "glib2-devel-0:2.56.4-159.el8.ppc64le", "product": { "name": "glib2-devel-0:2.56.4-159.el8.ppc64le", "product_id": "glib2-devel-0:2.56.4-159.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "glib2-fam-0:2.56.4-159.el8.ppc64le", "product": { "name": "glib2-fam-0:2.56.4-159.el8.ppc64le", "product_id": "glib2-fam-0:2.56.4-159.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-fam@2.56.4-159.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "glib2-tests-0:2.56.4-159.el8.ppc64le", "product": { "name": "glib2-tests-0:2.56.4-159.el8.ppc64le", "product_id": "glib2-tests-0:2.56.4-159.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-tests@2.56.4-159.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "glib2-debugsource-0:2.56.4-159.el8.ppc64le", "product": { "name": "glib2-debugsource-0:2.56.4-159.el8.ppc64le", "product_id": "glib2-debugsource-0:2.56.4-159.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "product": { "name": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "product_id": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "product": { "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "product": { "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "product": { "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "glib2-static-0:2.56.4-159.el8.ppc64le", "product": { "name": "glib2-static-0:2.56.4-159.el8.ppc64le", "product_id": "glib2-static-0:2.56.4-159.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-0:2.36.7-1.el8.ppc64le", "product": { "name": "webkit2gtk3-0:2.36.7-1.el8.ppc64le", "product_id": "webkit2gtk3-0:2.36.7-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "product": { "name": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "product": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "product": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "product": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=ppc64le" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=ppc64le" } } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "glib2-0:2.56.4-159.el8.i686", "product": { "name": "glib2-0:2.56.4-159.el8.i686", "product_id": "glib2-0:2.56.4-159.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=i686" } } }, { "category": "product_version", "name": "glib2-devel-0:2.56.4-159.el8.i686", "product": { "name": "glib2-devel-0:2.56.4-159.el8.i686", "product_id": "glib2-devel-0:2.56.4-159.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=i686" } } }, { "category": "product_version", "name": "glib2-debugsource-0:2.56.4-159.el8.i686", "product": { "name": "glib2-debugsource-0:2.56.4-159.el8.i686", "product_id": "glib2-debugsource-0:2.56.4-159.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=i686" } } }, { "category": "product_version", "name": "glib2-debuginfo-0:2.56.4-159.el8.i686", "product": { "name": "glib2-debuginfo-0:2.56.4-159.el8.i686", "product_id": "glib2-debuginfo-0:2.56.4-159.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=i686" } } }, { "category": "product_version", "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "product": { "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=i686" } } }, { "category": "product_version", "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "product": { "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=i686" } } }, { "category": "product_version", "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "product": { "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=i686" } } }, { "category": "product_version", "name": "glib2-static-0:2.56.4-159.el8.i686", "product": { "name": "glib2-static-0:2.56.4-159.el8.i686", "product_id": "glib2-static-0:2.56.4-159.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-0:2.36.7-1.el8.i686", "product": { "name": "webkit2gtk3-0:2.36.7-1.el8.i686", "product_id": "webkit2gtk3-0:2.36.7-1.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.36.7-1.el8.i686", "product": { "name": "webkit2gtk3-devel-0:2.36.7-1.el8.i686", "product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "product": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "product": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "product": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "product": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=i686" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=i686" } } } ], "category": "architecture", "name": "i686" }, { "branches": [ { "category": "product_version", "name": "glib2-0:2.56.4-159.el8.x86_64", "product": { "name": "glib2-0:2.56.4-159.el8.x86_64", "product_id": "glib2-0:2.56.4-159.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=x86_64" } } }, { "category": "product_version", "name": "glib2-devel-0:2.56.4-159.el8.x86_64", "product": { "name": "glib2-devel-0:2.56.4-159.el8.x86_64", "product_id": "glib2-devel-0:2.56.4-159.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=x86_64" } } }, { "category": "product_version", "name": "glib2-fam-0:2.56.4-159.el8.x86_64", "product": { "name": "glib2-fam-0:2.56.4-159.el8.x86_64", "product_id": "glib2-fam-0:2.56.4-159.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-fam@2.56.4-159.el8?arch=x86_64" } } }, { "category": "product_version", "name": "glib2-tests-0:2.56.4-159.el8.x86_64", "product": { "name": "glib2-tests-0:2.56.4-159.el8.x86_64", "product_id": "glib2-tests-0:2.56.4-159.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-tests@2.56.4-159.el8?arch=x86_64" } } }, { "category": "product_version", "name": "glib2-debugsource-0:2.56.4-159.el8.x86_64", "product": { "name": "glib2-debugsource-0:2.56.4-159.el8.x86_64", "product_id": "glib2-debugsource-0:2.56.4-159.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=x86_64" } } }, { "category": "product_version", "name": "glib2-debuginfo-0:2.56.4-159.el8.x86_64", "product": { "name": "glib2-debuginfo-0:2.56.4-159.el8.x86_64", "product_id": "glib2-debuginfo-0:2.56.4-159.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=x86_64" } } }, { "category": "product_version", "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "product": { "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=x86_64" } } }, { "category": "product_version", "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "product": { "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=x86_64" } } }, { "category": "product_version", "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "product": { "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=x86_64" } } }, { "category": "product_version", "name": "glib2-static-0:2.56.4-159.el8.x86_64", "product": { "name": "glib2-static-0:2.56.4-159.el8.x86_64", "product_id": "glib2-static-0:2.56.4-159.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-0:2.36.7-1.el8.x86_64", "product": { "name": "webkit2gtk3-0:2.36.7-1.el8.x86_64", "product_id": "webkit2gtk3-0:2.36.7-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "product": { "name": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "product": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "product": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "product": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=x86_64" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "glib2-0:2.56.4-159.el8.s390x", "product": { "name": "glib2-0:2.56.4-159.el8.s390x", "product_id": "glib2-0:2.56.4-159.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2@2.56.4-159.el8?arch=s390x" } } }, { "category": "product_version", "name": "glib2-devel-0:2.56.4-159.el8.s390x", "product": { "name": "glib2-devel-0:2.56.4-159.el8.s390x", "product_id": "glib2-devel-0:2.56.4-159.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-devel@2.56.4-159.el8?arch=s390x" } } }, { "category": "product_version", "name": "glib2-fam-0:2.56.4-159.el8.s390x", "product": { "name": "glib2-fam-0:2.56.4-159.el8.s390x", "product_id": "glib2-fam-0:2.56.4-159.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-fam@2.56.4-159.el8?arch=s390x" } } }, { "category": "product_version", "name": "glib2-tests-0:2.56.4-159.el8.s390x", "product": { "name": "glib2-tests-0:2.56.4-159.el8.s390x", "product_id": "glib2-tests-0:2.56.4-159.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-tests@2.56.4-159.el8?arch=s390x" } } }, { "category": "product_version", "name": "glib2-debugsource-0:2.56.4-159.el8.s390x", "product": { "name": "glib2-debugsource-0:2.56.4-159.el8.s390x", "product_id": "glib2-debugsource-0:2.56.4-159.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-debugsource@2.56.4-159.el8?arch=s390x" } } }, { "category": "product_version", "name": "glib2-debuginfo-0:2.56.4-159.el8.s390x", "product": { "name": "glib2-debuginfo-0:2.56.4-159.el8.s390x", "product_id": "glib2-debuginfo-0:2.56.4-159.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-debuginfo@2.56.4-159.el8?arch=s390x" } } }, { "category": "product_version", "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "product": { "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "product_id": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-devel-debuginfo@2.56.4-159.el8?arch=s390x" } } }, { "category": "product_version", "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "product": { "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "product_id": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-fam-debuginfo@2.56.4-159.el8?arch=s390x" } } }, { "category": "product_version", "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "product": { "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "product_id": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-tests-debuginfo@2.56.4-159.el8?arch=s390x" } } }, { "category": "product_version", "name": "glib2-static-0:2.56.4-159.el8.s390x", "product": { "name": "glib2-static-0:2.56.4-159.el8.s390x", "product_id": "glib2-static-0:2.56.4-159.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-static@2.56.4-159.el8?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-0:2.36.7-1.el8.s390x", "product": { "name": "webkit2gtk3-0:2.36.7-1.el8.s390x", "product_id": "webkit2gtk3-0:2.36.7-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3@2.36.7-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "product": { "name": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "product_id": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel@2.36.7-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "product": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "product_id": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc@2.36.7-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "product": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "product_id": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel@2.36.7-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "product": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "product_id": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debugsource@2.36.7-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "product": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "product_id": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-debuginfo@2.36.7-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "product": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "product_id": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-devel-debuginfo@2.36.7-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "product": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "product_id": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-debuginfo@2.36.7-1.el8?arch=s390x" } } }, { "category": "product_version", "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "product": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "product_id": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/webkit2gtk3-jsc-devel-debuginfo@2.36.7-1.el8?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "glib2-doc-0:2.56.4-159.el8.noarch", "product": { "name": "glib2-doc-0:2.56.4-159.el8.noarch", "product_id": "glib2-doc-0:2.56.4-159.el8.noarch", "product_identification_helper": { "purl": "pkg:rpm/redhat/glib2-doc@2.56.4-159.el8?arch=noarch" } } } ], "category": "architecture", "name": "noarch" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64" }, "product_reference": "webkit2gtk3-0:2.36.7-1.el8.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686" }, "product_reference": "webkit2gtk3-0:2.36.7-1.el8.i686", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le" }, "product_reference": "webkit2gtk3-0:2.36.7-1.el8.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x" }, "product_reference": "webkit2gtk3-0:2.36.7-1.el8.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.36.7-1.el8.src as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src" }, "product_reference": "webkit2gtk3-0:2.36.7-1.el8.src", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64" }, "product_reference": "webkit2gtk3-0:2.36.7-1.el8.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686" }, "product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le" }, "product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x" }, "product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64" }, "product_reference": "webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64" }, "product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686" }, "product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le" }, "product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x" }, "product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64" }, "product_reference": "webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64" }, "product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686" }, "product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.i686", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le" }, "product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x" }, "product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64" }, "product_reference": "webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64" }, "product_reference": "webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64" }, "product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686" }, "product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le" }, "product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x" }, "product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64" }, "product_reference": "webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64" }, "product_reference": "webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)", "product_id": "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" }, "product_reference": "webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64", "relates_to_product_reference": "AppStream-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686" }, "product_reference": "glib2-0:2.56.4-159.el8.i686", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-0:2.56.4-159.el8.src as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src" }, "product_reference": "glib2-0:2.56.4-159.el8.src", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-debuginfo-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686" }, "product_reference": "glib2-debuginfo-0:2.56.4-159.el8.i686", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-debuginfo-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-debuginfo-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debugsource-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-debugsource-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debugsource-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686" }, "product_reference": "glib2-debugsource-0:2.56.4-159.el8.i686", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debugsource-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-debugsource-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debugsource-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-debugsource-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debugsource-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-debugsource-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-devel-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686" }, "product_reference": "glib2-devel-0:2.56.4-159.el8.i686", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-devel-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-devel-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-devel-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686" }, "product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-doc-0:2.56.4-159.el8.noarch as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch" }, "product_reference": "glib2-doc-0:2.56.4-159.el8.noarch", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-fam-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-fam-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-fam-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-fam-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-fam-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-fam-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-fam-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-fam-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686" }, "product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-static-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-static-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-static-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686" }, "product_reference": "glib2-static-0:2.56.4-159.el8.i686", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-static-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-static-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-static-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-static-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-static-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-static-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-tests-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-tests-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-tests-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-tests-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-tests-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-tests-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-tests-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-tests-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686" }, "product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat Enterprise Linux BaseOS (v. 8)", "product_id": "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "BaseOS-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686" }, "product_reference": "glib2-0:2.56.4-159.el8.i686", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-0:2.56.4-159.el8.src as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src" }, "product_reference": "glib2-0:2.56.4-159.el8.src", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-debuginfo-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686" }, "product_reference": "glib2-debuginfo-0:2.56.4-159.el8.i686", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-debuginfo-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-debuginfo-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debugsource-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-debugsource-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debugsource-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686" }, "product_reference": "glib2-debugsource-0:2.56.4-159.el8.i686", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debugsource-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-debugsource-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debugsource-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-debugsource-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-debugsource-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-debugsource-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-devel-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686" }, "product_reference": "glib2-devel-0:2.56.4-159.el8.i686", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-devel-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-devel-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-devel-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686" }, "product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-doc-0:2.56.4-159.el8.noarch as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch" }, "product_reference": "glib2-doc-0:2.56.4-159.el8.noarch", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-fam-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-fam-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-fam-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-fam-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-fam-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-fam-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-fam-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-fam-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686" }, "product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-static-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-static-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-static-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686" }, "product_reference": "glib2-static-0:2.56.4-159.el8.i686", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-static-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-static-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-static-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-static-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-static-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-static-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-tests-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-tests-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-tests-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-tests-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-tests-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-tests-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-tests-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-tests-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64" }, "product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686" }, "product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le" }, "product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x" }, "product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "relates_to_product_reference": "CRB-8.7.0.GA" }, { "category": "default_component_of", "full_product_name": { "name": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 8)", "product_id": "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" }, "product_reference": "glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "relates_to_product_reference": "CRB-8.7.0.GA" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-22624", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-04-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073893" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22624" }, { "category": "external", "summary": "RHBZ#2073893", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073893" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22624", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22624" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22624" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:56:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7704" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-22628", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-04-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073896" } ], "notes": [ { "category": "description", "text": "A use-after-free issue was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22628" }, { "category": "external", "summary": "RHBZ#2073896", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073896" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22628", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22628" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22628" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:56:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7704" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-22629", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-04-11T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2073899" } ], "notes": [ { "category": "description", "text": "A buffer overflow vulnerability was found in WebKitGTK and WPE WebKit. This flaw allows a remote attacker to process maliciously crafted web content, leading to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Buffer overflow leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22629" }, { "category": "external", "summary": "RHBZ#2073899", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2073899" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22629", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22629" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22629" } ], "release_date": "2022-04-08T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:56:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7704" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Buffer overflow leading to arbitrary code execution" }, { "cve": "CVE-2022-22662", "cwe": { "id": "CWE-200", "name": "Exposure of Sensitive Information to an Unauthorized Actor" }, "discovery_date": "2022-07-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104787" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in WebKitGTK, where an issue occurs due to improper cookie management. This flaw allows a remote attacker to trick the victim into parsing maliciously crafted web content, triggering the vulnerability and gaining access to potentially sensitive information.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Cookie management issue leading to sensitive user information disclosure", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-22662" }, { "category": "external", "summary": "RHBZ#2104787", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104787" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-22662", "url": "https://www.cve.org/CVERecord?id=CVE-2022-22662" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-22662" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0006.html", "url": "https://webkitgtk.org/security/WSA-2022-0006.html" } ], "release_date": "2022-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:56:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7704" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Cookie management issue leading to sensitive user information disclosure" }, { "cve": "CVE-2022-26700", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092732" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. The vulnerability occurs due to improper input validation, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26700" }, { "category": "external", "summary": "RHBZ#2092732", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092732" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26700", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26700" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26700" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:56:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7704" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-26709", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-06-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092733" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26709" }, { "category": "external", "summary": "RHBZ#2092733", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092733" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26709", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26709" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26709" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:56:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7704" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26710", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-07-07T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2104789" } ], "notes": [ { "category": "description", "text": "A use-after-free vulnerability was found in WebKitGTK. The flaw occurs when processing maliciously crafted HTML content in WebKit. This flaw allows a remote attacker to trick the victim into visiting a specially crafted website, triggering memory corruption and executing arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 6, 7, 8, and 9 are affected because the code-base is affected by this vulnerability.\n\nSince Red Hat Enterprise Linux 6 and 7 are Out-of-Support-Scope for Low/Moderate flaws, the issue is not currently planned to be addressed in future updates for RHEL-6,7. Only Important and Critical severity flaws will be addressed at this time.\n\nFor additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat Enterprise Linux Life Cycle \u0026 Updates Policy: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26710" }, { "category": "external", "summary": "RHBZ#2104789", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2104789" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26710", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26710" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26710" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0006.html", "url": "https://webkitgtk.org/security/WSA-2022-0006.html" } ], "release_date": "2022-07-05T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:56:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7704" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26716", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092734" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a memory corruption vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26716" }, { "category": "external", "summary": "RHBZ#2092734", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092734" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26716", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26716" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26716" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:56:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7704" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-26717", "cwe": { "id": "CWE-416", "name": "Use After Free" }, "discovery_date": "2022-06-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092735" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to a use-after-free vulnerability. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Use-after-free leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26717" }, { "category": "external", "summary": "RHBZ#2092735", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092735" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26717", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26717" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26717" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:56:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7704" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Use-after-free leading to arbitrary code execution" }, { "cve": "CVE-2022-26719", "cwe": { "id": "CWE-1173", "name": "Improper Use of Validation Framework" }, "discovery_date": "2022-06-02T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2092736" } ], "notes": [ { "category": "description", "text": "A flaw was found in webkitgtk. Due to improper input validation, the issue occurs, leading to memory corruption. This flaw allows an attacker with network access to pass specially crafted web content files, causing an application to halt, crash, or arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Memory corruption issue leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-26719" }, { "category": "external", "summary": "RHBZ#2092736", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2092736" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-26719", "url": "https://www.cve.org/CVERecord?id=CVE-2022-26719" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-26719" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0005.html", "url": "https://webkitgtk.org/security/WSA-2022-0005.html" } ], "release_date": "2022-05-17T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:56:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7704" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Memory corruption issue leading to arbitrary code execution" }, { "cve": "CVE-2022-30293", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2022-05-06T00:00:00+00:00", "flags": [ { "label": "vulnerable_code_not_present", "product_ids": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] } ], "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2082548" } ], "notes": [ { "category": "description", "text": "A heap buffer overflow vulnerability was found in WebKitGTK. The vulnerability occurs when processing or rendering HTML content in WebKit. This flaw allows a remote attacker to trick the victim into opening a specially crafted web page, triggering a heap buffer overflow error and leading to the execution of arbitrary code on the system.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "known_not_affected": [ "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-30293" }, { "category": "external", "summary": "RHBZ#2082548", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2082548" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-30293", "url": "https://www.cve.org/CVERecord?id=CVE-2022-30293" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-30293" } ], "release_date": "2022-05-06T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:56:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7704" } ], "scores": [ { "cvss_v3": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Heap buffer overflow in WebCore::TextureMapperLayer::setContentsLayer leading to arbitrary code execution" }, { "cve": "CVE-2022-32792", "cwe": { "id": "CWE-787", "name": "Out-of-bounds Write" }, "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238973" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkit. This issue occurs when processing maliciously crafted web content which may lead to arbitrary code execution.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32792" }, { "category": "external", "summary": "RHBZ#2238973", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238973" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32792", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32792" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32792" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2022-0007.html", "url": "https://wpewebkit.org/security/WSA-2022-0007.html" } ], "release_date": "2022-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:56:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7704" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: Processing maliciously crafted web content may lead to arbitrary code execution" }, { "cve": "CVE-2022-32816", "discovery_date": "2023-09-14T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2238975" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkit. This issue occurs when visiting a website that frames malicious content, which may lead to UI spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: malicious content may lead to UI spoofing", "title": "Vulnerability summary" }, { "category": "other", "text": "This flaw is being rated as \u0027Moderate\u0027 as WebKitGTK package is shipped as a dependency for Gnome package, additionally Red Hat Enterprise Linux doesn\u0027t ship any WebKitGTK based web browser where this flaw would present a higher severity major threat.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32816" }, { "category": "external", "summary": "RHBZ#2238975", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2238975" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32816", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32816" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32816" }, { "category": "external", "summary": "https://wpewebkit.org/security/WSA-2022-0007.html", "url": "https://wpewebkit.org/security/WSA-2022-0007.html" } ], "release_date": "2022-07-04T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:56:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7704" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: malicious content may lead to UI spoofing" }, { "cve": "CVE-2022-32891", "cwe": { "id": "CWE-120", "name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)" }, "discovery_date": "2022-09-21T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "2128647" } ], "notes": [ { "category": "description", "text": "A vulnerability was found in webkitgtk, where an issue was addressed with improved UI handling. Visiting a website that frames malicious content may lead to UI spoofing.", "title": "Vulnerability description" }, { "category": "summary", "text": "webkitgtk: UI spoofing while Visiting a website that frames malicious content", "title": "Vulnerability summary" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2022-32891" }, { "category": "external", "summary": "RHBZ#2128647", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2128647" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2022-32891", "url": "https://www.cve.org/CVERecord?id=CVE-2022-32891" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891", "url": "https://nvd.nist.gov/vuln/detail/CVE-2022-32891" }, { "category": "external", "summary": "https://webkitgtk.org/security/WSA-2022-0009.html", "url": "https://webkitgtk.org/security/WSA-2022-0009.html" } ], "release_date": "2022-09-12T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2022-11-08T09:56:52+00:00", "details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258", "product_ids": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2022:7704" } ], "scores": [ { "cvss_v3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "products": [ "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.src", "AppStream-8.7.0.GA:webkit2gtk3-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-debugsource-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-devel-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-debuginfo-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-0:2.36.7-1.el8.x86_64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.aarch64", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.i686", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.ppc64le", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.s390x", "AppStream-8.7.0.GA:webkit2gtk3-jsc-devel-debuginfo-0:2.36.7-1.el8.x86_64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "BaseOS-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "BaseOS-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.src", "CRB-8.7.0.GA:glib2-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-debugsource-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-devel-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-doc-0:2.56.4-159.el8.noarch", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-fam-debuginfo-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-static-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-0:2.56.4-159.el8.x86_64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.aarch64", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.i686", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.ppc64le", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.s390x", "CRB-8.7.0.GA:glib2-tests-debuginfo-0:2.56.4-159.el8.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "webkitgtk: UI spoofing while Visiting a website that frames malicious content" } ] }
wid-sec-w-2022-1056
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Apple macOS ist ein Betriebssystem, das auf FreeBSD und Mach basiert.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann mehrere Schwachstellen in Apple macOS ausnutzen, , um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- MacOS X", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-1056 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-1056.json" }, { "category": "self", "summary": "WID-SEC-2022-1056 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-1056" }, { "category": "external", "summary": "Apple Security Advisory vom 2022-03-14", "url": "https://support.apple.com/en-us/HT213183" }, { "category": "external", "summary": "Apple Security Advisory vom 2022-03-14", "url": "https://support.apple.com/en-us/HT213184" }, { "category": "external", "summary": "Apple Security Advisory vom 2022-03-14", "url": "https://support.apple.com/en-us/HT213185" }, { "category": "external", "summary": "PoC von TrendMicro vom 2022-03-14", "url": "https://www.trendmicro.com/en_us/research/22/d/macos-suhelper-root-privilege-escalation-vulnerability-a-deep-di.html" } ], "source_lang": "en-US", "title": "Apple macOS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-06-21T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:33:26.744+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-1056", "initial_release_date": "2022-03-14T23:00:00.000+00:00", "revision_history": [ { "date": "2022-03-14T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-04-05T22:00:00.000+00:00", "number": "2", "summary": "Exploit aufgenommen" }, { "date": "2022-08-16T22:00:00.000+00:00", "number": "3", "summary": "CVE erg\u00e4nzt" }, { "date": "2023-06-21T22:00:00.000+00:00", "number": "4", "summary": "CVE erg\u00e4nzt" } ], "status": "final", "version": "4" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Apple macOS Monterey \u003c 12.3", "product": { "name": "Apple macOS Monterey \u003c 12.3", "product_id": "T022329", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:monterey__12.3" } } }, { "category": "product_name", "name": "Apple macOS Big Sur \u003c 11.6.5", "product": { "name": "Apple macOS Big Sur \u003c 11.6.5", "product_id": "T022330", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:big_sur__11.6.5" } } }, { "category": "product_name", "name": "Apple macOS Catalina", "product": { "name": "Apple macOS Catalina", "product_id": "T022331", "product_identification_helper": { "cpe": "cpe:/o:apple:mac_os:catalina" } } } ], "category": "product_name", "name": "macOS" } ], "category": "vendor", "name": "Apple" } ] }, "vulnerabilities": [ { "cve": "CVE-2022-46706", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-46706" }, { "cve": "CVE-2022-26690", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-26690" }, { "cve": "CVE-2022-26688", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-26688" }, { "cve": "CVE-2022-22672", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22672" }, { "cve": "CVE-2022-22669", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22669" }, { "cve": "CVE-2022-22668", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22668" }, { "cve": "CVE-2022-22665", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22665" }, { "cve": "CVE-2022-22664", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22664" }, { "cve": "CVE-2022-22662", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22662" }, { "cve": "CVE-2022-22661", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22661" }, { "cve": "CVE-2022-22660", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22660" }, { "cve": "CVE-2022-22657", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22657" }, { "cve": "CVE-2022-22656", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22656" }, { "cve": "CVE-2022-22655", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22655" }, { "cve": "CVE-2022-22651", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22651" }, { "cve": "CVE-2022-22650", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22650" }, { "cve": "CVE-2022-22648", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22648" }, { "cve": "CVE-2022-22647", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22647" }, { "cve": "CVE-2022-22644", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22644" }, { "cve": "CVE-2022-22643", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22643" }, { "cve": "CVE-2022-22641", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22641" }, { "cve": "CVE-2022-22640", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22640" }, { "cve": "CVE-2022-22639", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22639" }, { "cve": "CVE-2022-22638", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22638" }, { "cve": "CVE-2022-22637", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22637" }, { "cve": "CVE-2022-22633", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22633" }, { "cve": "CVE-2022-22632", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22632" }, { "cve": "CVE-2022-22631", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22631" }, { "cve": "CVE-2022-22630", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22630" }, { "cve": "CVE-2022-22629", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22629" }, { "cve": "CVE-2022-22628", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22628" }, { "cve": "CVE-2022-22627", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22627" }, { "cve": "CVE-2022-22626", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22626" }, { "cve": "CVE-2022-22625", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22625" }, { "cve": "CVE-2022-22624", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22624" }, { "cve": "CVE-2022-22623", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22623" }, { "cve": "CVE-2022-22621", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22621" }, { "cve": "CVE-2022-22617", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22617" }, { "cve": "CVE-2022-22616", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22616" }, { "cve": "CVE-2022-22615", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22615" }, { "cve": "CVE-2022-22614", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22614" }, { "cve": "CVE-2022-22613", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22613" }, { "cve": "CVE-2022-22612", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22612" }, { "cve": "CVE-2022-22611", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22611" }, { "cve": "CVE-2022-22610", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22610" }, { "cve": "CVE-2022-22609", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22609" }, { "cve": "CVE-2022-22600", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22600" }, { "cve": "CVE-2022-22599", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22599" }, { "cve": "CVE-2022-22597", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22597" }, { "cve": "CVE-2022-22582", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-22582" }, { "cve": "CVE-2022-0158", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-0158" }, { "cve": "CVE-2022-0156", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-0156" }, { "cve": "CVE-2022-0128", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2022-0128" }, { "cve": "CVE-2021-46059", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2021-46059" }, { "cve": "CVE-2021-4193", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2021-4193" }, { "cve": "CVE-2021-4192", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2021-4192" }, { "cve": "CVE-2021-4187", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2021-4187" }, { "cve": "CVE-2021-4173", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2021-4173" }, { "cve": "CVE-2021-4166", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2021-4166" }, { "cve": "CVE-2021-4136", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2021-4136" }, { "cve": "CVE-2021-36976", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2021-36976" }, { "cve": "CVE-2021-30918", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2021-30918" }, { "cve": "CVE-2021-22947", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2021-22947" }, { "cve": "CVE-2021-22946", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2021-22946" }, { "cve": "CVE-2021-22945", "notes": [ { "category": "description", "text": "In Apple macOS existieren mehrere Schwachstellen. Die Fehler bestehen in den Komponenten Accelerate Framework, AMD, AppKit, AppleGraphicsControl, AppleScript, BOM, Curl, FaceTime, ImageIO, Intel Graphics Driver, IOGPUFamily, Kernel, libarchive, Login Window, GarageBand MIDI, NSSpellChecker, PackageKit, Preferences, QuickTime Player, Safari Downloads, Sandbox, Siri, SMB, SoftwareUpdate, System Preferences, UIKit, Vim, VoiceOver, WebKit, Wi-Fi und Xar. Ein entfernter anonymer, authentisierter, lokaler oder physischer Angreifer kann diese Schwachstellen ausnutzen, um seine Privilegien zu erweitern, vertrauliche Informationen offenzulegen, Sicherheitsma\u00dfnahmen zu umgehen, einen Denial-of-Service-Zustand herbeizuf\u00fchren, einen Spoofing-Angriff durchzuf\u00fchren und beliebigen Code auszuf\u00fchren. Die erfolgreiche Ausnutzung einiger dieser Schwachstellen erfordert eine Benutzerinteraktion." } ], "product_status": { "known_affected": [ "T022331" ] }, "release_date": "2022-03-14T23:00:00.000+00:00", "title": "CVE-2021-22945" } ] }
wid-sec-w-2022-2044
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Red Hat Enterprise Linux (RHEL) ist eine popul\u00e4re Linux-Distribution.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in Red Hat Enterprise Linux ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2022-2044 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2022/wid-sec-w-2022-2044.json" }, { "category": "self", "summary": "WID-SEC-2022-2044 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2022-2044" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7447" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7458" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7514" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7548" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7558" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7822" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7704" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7622" }, { "category": "external", "summary": "Red Hat Security Advisory vom 2022-11-08", "url": "https://access.redhat.com/errata/RHSA-2022:7639" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8008 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:8008" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7704 vom 2022-11-15", "url": "https://linux.oracle.com/errata/ELSA-2022-7704.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8431 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:8431" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7458 vom 2022-11-15", "url": "https://linux.oracle.com/errata/ELSA-2022-7458.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7935 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:7935" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7950 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:7950" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8139 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:8139" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8062 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:8062" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8054 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:8054" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8011 vom 2022-11-15", "url": "https://access.redhat.com/errata/RHSA-2022:8011" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-8054 vom 2022-11-22", "url": "https://linux.oracle.com/errata/ELSA-2022-8054.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-7822 vom 2022-11-24", "url": "http://linux.oracle.com/errata/ELSA-2022-7822.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-8431 vom 2022-11-24", "url": "http://linux.oracle.com/errata/ELSA-2022-8431.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2022-10031 vom 2022-11-29", "url": "https://linux.oracle.com/errata/ELSA-2022-10031.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8626 vom 2022-11-29", "url": "https://access.redhat.com/errata/RHSA-2022:8626" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:8781 vom 2022-12-08", "url": "https://access.redhat.com/errata/RHSA-2022:8781" }, { "category": "external", "summary": "Gentoo Linux Security Advisory GLSA-202212-02 vom 2022-12-19", "url": "https://security.gentoo.org/glsa/202212-02" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2022:7398 vom 2023-01-18", "url": "https://access.redhat.com/errata/RHSA-2022:7398" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:1275 vom 2023-03-15", "url": "https://access.redhat.com/errata/RHSA-2023:1275" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:2193 vom 2023-05-09", "url": "https://access.redhat.com/errata/RHSA-2023:2193" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:2758 vom 2023-05-16", "url": "https://access.redhat.com/errata/RHSA-2023:2758" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2023:2802 vom 2023-05-16", "url": "https://access.redhat.com/errata/RHSA-2023:2802" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2023-2116 vom 2023-07-20", "url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2116.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2468 vom 2024-02-19", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2468.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALAS-2024-2452 vom 2024-02-06", "url": "https://alas.aws.amazon.com/AL2/ALAS-2024-2452.html" }, { "category": "external", "summary": "Amazon Linux Security Advisory ALASR4-2023-001 vom 2024-01-23", "url": "https://alas.aws.amazon.com/AL2/ALASR4-2023-001.html" }, { "category": "external", "summary": "Red Hat Security Advisory RHSA-2024:2045 vom 2024-04-25", "url": "https://access.redhat.com/errata/RHSA-2024:2045" } ], "source_lang": "en-US", "title": "Red Hat Enterprise Linux: Mehrere Schwachstellen", "tracking": { "current_release_date": "2024-04-24T22:00:00.000+00:00", "generator": { "date": "2024-08-15T17:38:00.017+00:00", "engine": { "name": "BSI-WID", "version": "1.3.5" } }, "id": "WID-SEC-W-2022-2044", "initial_release_date": "2022-11-08T23:00:00.000+00:00", "revision_history": [ { "date": "2022-11-08T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2022-11-15T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen" }, { "date": "2022-11-23T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2022-11-28T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux und Red Hat aufgenommen" }, { "date": "2022-12-07T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2022-12-18T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Gentoo aufgenommen" }, { "date": "2023-01-17T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-03-15T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-05-09T22:00:00.000+00:00", "number": "9", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-05-16T22:00:00.000+00:00", "number": "10", "summary": "Neue Updates von Red Hat aufgenommen" }, { "date": "2023-07-20T22:00:00.000+00:00", "number": "11", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-01-22T23:00:00.000+00:00", "number": "12", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-02-05T23:00:00.000+00:00", "number": "13", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-02-19T23:00:00.000+00:00", "number": "14", "summary": "Neue Updates von Amazon aufgenommen" }, { "date": "2024-04-24T22:00:00.000+00:00", "number": "15", "summary": "Neue Updates von Red Hat aufgenommen" } ], "status": "final", "version": "15" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Amazon Linux 2", "product": { "name": "Amazon Linux 2", "product_id": "398363", "product_identification_helper": { "cpe": "cpe:/o:amazon:linux_2:-" } } } ], "category": "vendor", "name": "Amazon" }, { "branches": [ { "category": "product_name", "name": "Gentoo Linux", "product": { "name": "Gentoo Linux", "product_id": "T012167", "product_identification_helper": { "cpe": "cpe:/o:gentoo:linux:-" } } } ], "category": "vendor", "name": "Gentoo" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux", "product": { "name": "Red Hat Enterprise Linux", "product_id": "67646", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:-" } } }, { "category": "product_version", "name": "8", "product": { "name": "Red Hat Enterprise Linux 8", "product_id": "T014111", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:8" } } } ], "category": "product_name", "name": "Enterprise Linux" }, { "category": "product_name", "name": "Red Hat OpenShift", "product": { "name": "Red Hat OpenShift", "product_id": "T008027", "product_identification_helper": { "cpe": "cpe:/a:redhat:openshift:-" } } } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2021-4048", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2021-4048" }, { "cve": "CVE-2021-44269", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2021-44269" }, { "cve": "CVE-2022-1049", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-1049" }, { "cve": "CVE-2022-21682", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-21682" }, { "cve": "CVE-2022-22624", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-22624" }, { "cve": "CVE-2022-22628", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-22628" }, { "cve": "CVE-2022-22629", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-22629" }, { "cve": "CVE-2022-22662", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-22662" }, { "cve": "CVE-2022-25308", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-25308" }, { "cve": "CVE-2022-25309", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-25309" }, { "cve": "CVE-2022-25310", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-25310" }, { "cve": "CVE-2022-26700", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-26700" }, { "cve": "CVE-2022-26709", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-26709" }, { "cve": "CVE-2022-26710", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-26710" }, { "cve": "CVE-2022-26716", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-26716" }, { "cve": "CVE-2022-26717", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-26717" }, { "cve": "CVE-2022-26719", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-26719" }, { "cve": "CVE-2022-2989", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-2989" }, { "cve": "CVE-2022-2990", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-2990" }, { "cve": "CVE-2022-30293", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-30293" }, { "cve": "CVE-2022-30698", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-30698" }, { "cve": "CVE-2022-30699", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-30699" }, { "cve": "CVE-2022-32189", "notes": [ { "category": "description", "text": "In Red Hat Enterprise Linux existieren mehrere Schwachstellen. Diese sind auf Fehler in verschiedenen Komponenten zur\u00fcckzuf\u00fchren. Ein entfernter, anonymer Angreifer kann diese Schwachstellen ausnutzen, um beliebigen Programmcode auszuf\u00fchren, Dateien zu manipulieren, Informationen offenzulegen oder einen Denial of Service Zustand herbeizuf\u00fchren. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich." } ], "product_status": { "known_affected": [ "T008027", "67646", "398363", "T012167", "T004914", "T014111" ] }, "release_date": "2022-11-08T23:00:00.000+00:00", "title": "CVE-2022-32189" } ] }
gsd-2022-22628
Vulnerability from gsd
{ "GSD": { "alias": "CVE-2022-22628", "description": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution.", "id": "GSD-2022-22628", "references": [ "https://www.debian.org/security/2022/dsa-5115", "https://www.debian.org/security/2022/dsa-5116", "https://advisories.mageia.org/CVE-2022-22628.html", "https://www.suse.com/security/cve/CVE-2022-22628.html", "https://ubuntu.com/security/CVE-2022-22628", "https://security.archlinux.org/CVE-2022-22628", "https://access.redhat.com/errata/RHSA-2022:7704", "https://access.redhat.com/errata/RHSA-2022:8054" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2022-22628" ], "details": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution.", "id": "GSD-2022-22628", "modified": "2023-12-13T01:19:29.335985Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2022-22628", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Safari", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "15.4" } ] } }, { "product_name": "tvOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "15.4" } ] } }, { "product_name": "tvOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "12.3" } ] } }, { "product_name": "tvOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "15.4" } ] } }, { "product_name": "watchOS", "version": { "version_data": [ { "version_affected": "\u003c", "version_value": "8.5" } ] } } ] }, "vendor_name": "Apple" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Processing maliciously crafted web content may lead to arbitrary code execution" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/en-us/HT213182", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT213182" }, { "name": "https://support.apple.com/en-us/HT213193", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT213193" }, { "name": "https://support.apple.com/en-us/HT213183", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT213183" }, { "name": "https://support.apple.com/en-us/HT213186", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT213186" }, { "name": "https://support.apple.com/en-us/HT213187", "refsource": "MISC", "url": "https://support.apple.com/en-us/HT213187" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:apple:tvos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "15.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:iphone_os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "15.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:watchos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "8.5", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:macos:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "12.3", "versionStartIncluding": "12.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:apple:safari:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "15.4", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:apple:ipad_os:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndExcluding": "15.4", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "product-security@apple.com", "ID": "CVE-2022-22628" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-416" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.apple.com/en-us/HT213186", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT213186" }, { "name": "https://support.apple.com/en-us/HT213187", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT213187" }, { "name": "https://support.apple.com/en-us/HT213182", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT213182" }, { "name": "https://support.apple.com/en-us/HT213193", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT213193" }, { "name": "https://support.apple.com/en-us/HT213183", "refsource": "MISC", "tags": [ "Vendor Advisory" ], "url": "https://support.apple.com/en-us/HT213183" } ] } }, "impact": { "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2022-09-28T12:06Z", "publishedDate": "2022-09-23T19:15Z" } } }
var-202203-0131
Vulnerability from variot
A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution. Safari , iPadOS , iOS Multiple Apple products contain a freed memory usage vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state.
For the stable distribution (bullseye), these problems have been fixed in version 2.36.0-2~deb11u1.
We recommend that you upgrade your wpewebkit packages.
For the detailed security status of wpewebkit please refer to its security tracker page at: https://security-tracker.debian.org/tracker/wpewebkit
Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEYrwugQBKzlHMYFizAAyEYu0C2AIFAmJQSZIACgkQAAyEYu0C 2AI87w//TosvtVmwYX78ws2AXV8/0oD2MeDvY2B6zdCzmyGxu0R3Nut+9dbr7Gxh O06+LiIkivR/ciijHi5OsWyoFL6XogGV5MDAR01u0mJpPhqc0cUCrMGW2N6hpw9D ZtZnpXnwu+XRGCAfBDh6OIBxUIVEwxc+Br5ypOC8/FyCjlJFObM8+uFOjc4skpPx 0XxRZy81ifhK6WctcdHAWMW1dcFGcf5qcsP4xSImXf5zNEkvyyD4bAYzB8EJxwhc gLzDVT8uZ27zSCSkMbPDcxEsH3vExY2yXtFo+fp6uz6nMUaMKfc4AZcljb5iABaL 6w4R67tUZHR5z8nURMx+nEBgE0xk+fFHwfSXv5H9n0vJWewdxk8nigd2zinKhBPT 8ZKJ+lowQS00Mj3oCaLG5rYya0zICzzGFYEfSYCglVCY8mQOZSN+4aD+I9+D1RCY Sb9J7bLPLR9HqDPH7w9YxfeIUv9npB2PH0G39VuaFOKssVZnf9qrnxjPOi5oCryS ypU3eQGILLd1/dF40YyPXXmb1oNC058Nx/9KGv/8A2o/INsoSjbKPJsub8UMARk5 D+CApvrDAAruYs6Z6Wrt46+dlsSYk46SMo2Xo+2gHF/TQPii3LugA5gKBHk8JvR5 PDURURtFHDbsgHbR2WaJKTdDUzQH3RHLeb2BfU7FEWIOusG+Azs= =RWku -----END PGP SIGNATURE----- . Summary:
OpenShift API for Data Protection (OADP) 1.1.2 is now available. Description:
OpenShift API for Data Protection (OADP) enables you to back up and restore application resources, persistent volume data, and internal container images to external backup storage. OADP enables both file system-based and snapshot-based backups for persistent volumes.
Security Fix(es) from Bugzilla:
-
golang: archive/tar: unbounded memory consumption when reading headers (CVE-2022-2879)
-
golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters (CVE-2022-2880)
-
golang: regexp/syntax: limit memory used by parsing regexps (CVE-2022-41715)
-
golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests (CVE-2022-41717)
For more details about the security issue(s), including the impact, a CVSS score, and other related information, refer to the CVE page(s) listed in the References section. Solution:
Before applying this update, make sure all previously released errata relevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):
2132867 - CVE-2022-2879 golang: archive/tar: unbounded memory consumption when reading headers 2132868 - CVE-2022-2880 golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters 2132872 - CVE-2022-41715 golang: regexp/syntax: limit memory used by parsing regexps 2161274 - CVE-2022-41717 golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests
- JIRA issues fixed (https://issues.jboss.org/):
OADP-1056 - DPA fails validation if multiple BSLs have the same provider OADP-1150 - Handle docker env config changes in the oadp-operator OADP-1217 - update velero + restic to 1.9.5 OADP-1256 - Backup stays in progress status after restic pod is restarted due to OOM killed OADP-1289 - Restore partially fails with error "Secrets \"deployer-token-rrjqx\" not found" OADP-290 - Remove creation/usage of velero-privileged SCC
- Bugs fixed (https://bugzilla.redhat.com/):
2142707 - CVE-2022-42920 Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing
- Bugs fixed (https://bugzilla.redhat.com/):
2134876 - CVE-2022-37601 loader-utils: prototype pollution in function parseQuery in parseQuery.js 2140597 - CVE-2022-37603 loader-utils:Regular expression denial of service 2142707 - CVE-2022-42920 Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing 2150323 - CVE-2022-24999 express: "qs" prototype poisoning causes the hang of the node process 2156263 - CVE-2022-46175 json5: Prototype Pollution in JSON5 via Parse Method 2156324 - CVE-2021-35065 glob-parent: Regular Expression Denial of Service 2156683 - CVE-2020-36567 gin: Unsanitized input in the default logger in github.com/gin-gonic/gin 2161274 - CVE-2022-41717 golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests
- JIRA issues fixed (https://issues.jboss.org/):
MTA-103 - MTA 6.0.1 Installation failed with CrashLoop Error for UI Pod MTA-106 - Implement ability for windup addon image pull policy to be configurable MTA-122 - MTA is upgrading automatically ignoring 'Manual' setting MTA-123 - MTA Becomes unusable when running bulk binary analysis MTA-127 - After upgrading MTA operator from 6.0.0 to 6.0.1 and running analysis , task pods starts failing MTA-131 - Analysis stops working after MTA upgrade from 6.0.0 to 6.0.1 MTA-36 - Can't disable a proxy if it has an invalid configuration MTA-44 - Make RWX volumes optional. MTA-49 - Uploaded a local binary when return back to the page the UI should show green bar and correct % MTA-59 - Getting error 401 if deleting many credentials quickly MTA-65 - Set windup addon image pull policy to be controlled by the global image_pull_policy parameter MTA-72 - CVE-2022-46175 mta-ui-container: json5: Prototype Pollution in JSON5 via Parse Method [mta-6] MTA-73 - CVE-2022-37601 mta-ui-container: loader-utils: prototype pollution in function parseQuery in parseQuery.js [mta-6] MTA-74 - CVE-2020-36567 mta-windup-addon-container: gin: Unsanitized input in the default logger in github.com/gin-gonic/gin [mta-6] MTA-76 - CVE-2022-37603 mta-ui-container: loader-utils:Regular expression denial of service [mta-6] MTA-77 - CVE-2020-36567 mta-hub-container: gin: Unsanitized input in the default logger in github.com/gin-gonic/gin [mta-6] MTA-80 - CVE-2021-35065 mta-ui-container: glob-parent: Regular Expression Denial of Service [mta-6] MTA-82 - CVE-2022-42920 org.jboss.windup-windup-cli-parent: Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing [mta-6.0] MTA-85 - CVE-2022-24999 mta-ui-container: express: "qs" prototype poisoning causes the hang of the node process [mta-6] MTA-88 - CVE-2020-36567 mta-admin-addon-container: gin: Unsanitized input in the default logger in github.com/gin-gonic/gin [mta-6] MTA-92 - CVE-2022-42920 org.jboss.windup.plugin-windup-maven-plugin-parent: Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing [mta-6.0] MTA-96 - [UI] Maven -> "Local artifact repository" textbox can be checked and has no tooltip
- -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: webkit2gtk3 security and bug fix update Advisory ID: RHSA-2022:7704-01 Product: Red Hat Enterprise Linux Advisory URL: https://access.redhat.com/errata/RHSA-2022:7704 Issue date: 2022-11-08 CVE Names: CVE-2022-22624 CVE-2022-22628 CVE-2022-22629 CVE-2022-22662 CVE-2022-26700 CVE-2022-26709 CVE-2022-26710 CVE-2022-26716 CVE-2022-26717 CVE-2022-26719 CVE-2022-30293 ==================================================================== 1. Summary:
An update for glib2 and webkit2gtk3 is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.
- Relevant releases/architectures:
Red Hat CodeReady Linux Builder (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64 Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64 Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64
- Description:
WebKitGTK is the port of the portable web rendering engine WebKit to the GTK platform.
GLib provides the core application building blocks for libraries and applications written in C. It provides the core object system used in GNOME, the main loop implementation, and a large set of utility functions for strings and common data structures.
Additional Changes:
For detailed information on changes in this release, see the Red Hat Enterprise Linux 8.7 Release Notes linked from the References section.
- Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
https://access.redhat.com/articles/11258
- Package List:
Red Hat Enterprise Linux AppStream (v. 8):
Source: webkit2gtk3-2.36.7-1.el8.src.rpm
aarch64: webkit2gtk3-2.36.7-1.el8.aarch64.rpm webkit2gtk3-debuginfo-2.36.7-1.el8.aarch64.rpm webkit2gtk3-debugsource-2.36.7-1.el8.aarch64.rpm webkit2gtk3-devel-2.36.7-1.el8.aarch64.rpm webkit2gtk3-devel-debuginfo-2.36.7-1.el8.aarch64.rpm webkit2gtk3-jsc-2.36.7-1.el8.aarch64.rpm webkit2gtk3-jsc-debuginfo-2.36.7-1.el8.aarch64.rpm webkit2gtk3-jsc-devel-2.36.7-1.el8.aarch64.rpm webkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8.aarch64.rpm
ppc64le: webkit2gtk3-2.36.7-1.el8.ppc64le.rpm webkit2gtk3-debuginfo-2.36.7-1.el8.ppc64le.rpm webkit2gtk3-debugsource-2.36.7-1.el8.ppc64le.rpm webkit2gtk3-devel-2.36.7-1.el8.ppc64le.rpm webkit2gtk3-devel-debuginfo-2.36.7-1.el8.ppc64le.rpm webkit2gtk3-jsc-2.36.7-1.el8.ppc64le.rpm webkit2gtk3-jsc-debuginfo-2.36.7-1.el8.ppc64le.rpm webkit2gtk3-jsc-devel-2.36.7-1.el8.ppc64le.rpm webkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8.ppc64le.rpm
s390x: webkit2gtk3-2.36.7-1.el8.s390x.rpm webkit2gtk3-debuginfo-2.36.7-1.el8.s390x.rpm webkit2gtk3-debugsource-2.36.7-1.el8.s390x.rpm webkit2gtk3-devel-2.36.7-1.el8.s390x.rpm webkit2gtk3-devel-debuginfo-2.36.7-1.el8.s390x.rpm webkit2gtk3-jsc-2.36.7-1.el8.s390x.rpm webkit2gtk3-jsc-debuginfo-2.36.7-1.el8.s390x.rpm webkit2gtk3-jsc-devel-2.36.7-1.el8.s390x.rpm webkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8.s390x.rpm
x86_64: webkit2gtk3-2.36.7-1.el8.i686.rpm webkit2gtk3-2.36.7-1.el8.x86_64.rpm webkit2gtk3-debuginfo-2.36.7-1.el8.i686.rpm webkit2gtk3-debuginfo-2.36.7-1.el8.x86_64.rpm webkit2gtk3-debugsource-2.36.7-1.el8.i686.rpm webkit2gtk3-debugsource-2.36.7-1.el8.x86_64.rpm webkit2gtk3-devel-2.36.7-1.el8.i686.rpm webkit2gtk3-devel-2.36.7-1.el8.x86_64.rpm webkit2gtk3-devel-debuginfo-2.36.7-1.el8.i686.rpm webkit2gtk3-devel-debuginfo-2.36.7-1.el8.x86_64.rpm webkit2gtk3-jsc-2.36.7-1.el8.i686.rpm webkit2gtk3-jsc-2.36.7-1.el8.x86_64.rpm webkit2gtk3-jsc-debuginfo-2.36.7-1.el8.i686.rpm webkit2gtk3-jsc-debuginfo-2.36.7-1.el8.x86_64.rpm webkit2gtk3-jsc-devel-2.36.7-1.el8.i686.rpm webkit2gtk3-jsc-devel-2.36.7-1.el8.x86_64.rpm webkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8.i686.rpm webkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8.x86_64.rpm
Red Hat Enterprise Linux BaseOS (v. 8):
Source: glib2-2.56.4-159.el8.src.rpm
aarch64: glib2-2.56.4-159.el8.aarch64.rpm glib2-debuginfo-2.56.4-159.el8.aarch64.rpm glib2-debugsource-2.56.4-159.el8.aarch64.rpm glib2-devel-2.56.4-159.el8.aarch64.rpm glib2-devel-debuginfo-2.56.4-159.el8.aarch64.rpm glib2-fam-2.56.4-159.el8.aarch64.rpm glib2-fam-debuginfo-2.56.4-159.el8.aarch64.rpm glib2-tests-2.56.4-159.el8.aarch64.rpm glib2-tests-debuginfo-2.56.4-159.el8.aarch64.rpm
ppc64le: glib2-2.56.4-159.el8.ppc64le.rpm glib2-debuginfo-2.56.4-159.el8.ppc64le.rpm glib2-debugsource-2.56.4-159.el8.ppc64le.rpm glib2-devel-2.56.4-159.el8.ppc64le.rpm glib2-devel-debuginfo-2.56.4-159.el8.ppc64le.rpm glib2-fam-2.56.4-159.el8.ppc64le.rpm glib2-fam-debuginfo-2.56.4-159.el8.ppc64le.rpm glib2-tests-2.56.4-159.el8.ppc64le.rpm glib2-tests-debuginfo-2.56.4-159.el8.ppc64le.rpm
s390x: glib2-2.56.4-159.el8.s390x.rpm glib2-debuginfo-2.56.4-159.el8.s390x.rpm glib2-debugsource-2.56.4-159.el8.s390x.rpm glib2-devel-2.56.4-159.el8.s390x.rpm glib2-devel-debuginfo-2.56.4-159.el8.s390x.rpm glib2-fam-2.56.4-159.el8.s390x.rpm glib2-fam-debuginfo-2.56.4-159.el8.s390x.rpm glib2-tests-2.56.4-159.el8.s390x.rpm glib2-tests-debuginfo-2.56.4-159.el8.s390x.rpm
x86_64: glib2-2.56.4-159.el8.i686.rpm glib2-2.56.4-159.el8.x86_64.rpm glib2-debuginfo-2.56.4-159.el8.i686.rpm glib2-debuginfo-2.56.4-159.el8.x86_64.rpm glib2-debugsource-2.56.4-159.el8.i686.rpm glib2-debugsource-2.56.4-159.el8.x86_64.rpm glib2-devel-2.56.4-159.el8.i686.rpm glib2-devel-2.56.4-159.el8.x86_64.rpm glib2-devel-debuginfo-2.56.4-159.el8.i686.rpm glib2-devel-debuginfo-2.56.4-159.el8.x86_64.rpm glib2-fam-2.56.4-159.el8.x86_64.rpm glib2-fam-debuginfo-2.56.4-159.el8.i686.rpm glib2-fam-debuginfo-2.56.4-159.el8.x86_64.rpm glib2-tests-2.56.4-159.el8.x86_64.rpm glib2-tests-debuginfo-2.56.4-159.el8.i686.rpm glib2-tests-debuginfo-2.56.4-159.el8.x86_64.rpm
Red Hat CodeReady Linux Builder (v. 8):
aarch64: glib2-debuginfo-2.56.4-159.el8.aarch64.rpm glib2-debugsource-2.56.4-159.el8.aarch64.rpm glib2-devel-debuginfo-2.56.4-159.el8.aarch64.rpm glib2-fam-debuginfo-2.56.4-159.el8.aarch64.rpm glib2-static-2.56.4-159.el8.aarch64.rpm glib2-tests-debuginfo-2.56.4-159.el8.aarch64.rpm
noarch: glib2-doc-2.56.4-159.el8.noarch.rpm
ppc64le: glib2-debuginfo-2.56.4-159.el8.ppc64le.rpm glib2-debugsource-2.56.4-159.el8.ppc64le.rpm glib2-devel-debuginfo-2.56.4-159.el8.ppc64le.rpm glib2-fam-debuginfo-2.56.4-159.el8.ppc64le.rpm glib2-static-2.56.4-159.el8.ppc64le.rpm glib2-tests-debuginfo-2.56.4-159.el8.ppc64le.rpm
s390x: glib2-debuginfo-2.56.4-159.el8.s390x.rpm glib2-debugsource-2.56.4-159.el8.s390x.rpm glib2-devel-debuginfo-2.56.4-159.el8.s390x.rpm glib2-fam-debuginfo-2.56.4-159.el8.s390x.rpm glib2-static-2.56.4-159.el8.s390x.rpm glib2-tests-debuginfo-2.56.4-159.el8.s390x.rpm
x86_64: glib2-debuginfo-2.56.4-159.el8.i686.rpm glib2-debuginfo-2.56.4-159.el8.x86_64.rpm glib2-debugsource-2.56.4-159.el8.i686.rpm glib2-debugsource-2.56.4-159.el8.x86_64.rpm glib2-devel-debuginfo-2.56.4-159.el8.i686.rpm glib2-devel-debuginfo-2.56.4-159.el8.x86_64.rpm glib2-fam-debuginfo-2.56.4-159.el8.i686.rpm glib2-fam-debuginfo-2.56.4-159.el8.x86_64.rpm glib2-static-2.56.4-159.el8.i686.rpm glib2-static-2.56.4-159.el8.x86_64.rpm glib2-tests-debuginfo-2.56.4-159.el8.i686.rpm glib2-tests-debuginfo-2.56.4-159.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/
- References:
https://access.redhat.com/security/cve/CVE-2022-22624 https://access.redhat.com/security/cve/CVE-2022-22628 https://access.redhat.com/security/cve/CVE-2022-22629 https://access.redhat.com/security/cve/CVE-2022-22662 https://access.redhat.com/security/cve/CVE-2022-26700 https://access.redhat.com/security/cve/CVE-2022-26709 https://access.redhat.com/security/cve/CVE-2022-26710 https://access.redhat.com/security/cve/CVE-2022-26716 https://access.redhat.com/security/cve/CVE-2022-26717 https://access.redhat.com/security/cve/CVE-2022-26719 https://access.redhat.com/security/cve/CVE-2022-30293 https://access.redhat.com/security/updates/classification/#moderate https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index
- Contact:
The Red Hat security contact is secalert@redhat.com. More contact details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1
iQIVAwUBY2pSR9zjgjWX9erEAQiQFQ//YREiZYxfs4xndA0wPNv+fq6qubz4ht3h FycNYUUhtiB+KqnpXfelECae9VC+jtDaBqrmopN4kGYPERbIBNOaxDM/AjiwQoRy WAMPMG0Nf7bES6RH793l9a36dPezHS7FQymSw1UsWgiFLEzalcP41UhJmz2ehhnF 89oC3QQ831rCFn637hiTMFkaOMhQsR+P7iCnpDXEA9f3jadtWkMk+ALkddEGR+zr bbCVMi3vd4q1w854SOU0mZjdBXd3JKcBFq5Iux1gY6XVDCilgU6QgZaltJJQx2u6 J3qGFykmSwgoCfvz2QUBMH5x3gYJHknfa1CrqgOtOC5gpO9ChEyRg7T5aC/mpY4P kfFh0VJEOZS29b34KOlKvXCRbgDjvuBy8EHvqJCs29a9ISOWOpZ8qsLDjTMBk+MR AU+J3Ym3ZiRaQhpFDDSakcuub0DAHESbokIsTHlsOt8J80GspJod3GRl2BUfY4FH uVH6t7IIL0k6zL/1si7cEnT1uMxp7rPh70KPSG0hm2CHrJ6MOLt9D6/eAuj7xAEL vkxev1kJ28kXoovVYmylhcjxX4w6v1M9QGE7IBMFEnFDi6btyWNDjD1vLGvmbuIT iJ120wnUt3kGH0vMLO2+Rfwj7jYVyR08tTY8JDtrxbhrUThjhJ9GCTLg3s+MaYVk J8NwK2xt2AQ=vhlq -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Bugs fixed (https://bugzilla.redhat.com/):
2064698 - CVE-2020-36518 jackson-databind: denial of service via a large depth of nested objects 2135244 - CVE-2022-42003 jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS 2135247 - CVE-2022-42004 jackson-databind: use of deeply nested arrays
- JIRA issues fixed (https://issues.jboss.org/):
LOG-3293 - log-file-metric-exporter container has not limits exhausting the resources of the node
-
Gentoo Linux Security Advisory GLSA 202208-39
https://security.gentoo.org/
Severity: High Title: WebKitGTK+: Multiple Vulnerabilities Date: August 31, 2022 Bugs: #866494, #864427, #856445, #861740, #837305, #845252, #839984, #833568, #832990 ID: 202208-39
Synopsis
Multiple vulnerabilities have been found in WebkitGTK+, the worst of which could result in the arbitrary execution of code.
Affected packages
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 net-libs/webkit-gtk < 2.36.7 >= 2.36.7
Description
Multiple vulnerabilities have been discovered in WebKitGTK+. Please review the CVE identifiers referenced below for details.
Impact
Please review the referenced CVE identifiers for details.
Workaround
There is no known workaround at this time.
Resolution
All WebKitGTK+ users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose ">=net-libs/webkit-gtk-2.36.7"
References
[ 1 ] CVE-2022-2294 https://nvd.nist.gov/vuln/detail/CVE-2022-2294 [ 2 ] CVE-2022-22589 https://nvd.nist.gov/vuln/detail/CVE-2022-22589 [ 3 ] CVE-2022-22590 https://nvd.nist.gov/vuln/detail/CVE-2022-22590 [ 4 ] CVE-2022-22592 https://nvd.nist.gov/vuln/detail/CVE-2022-22592 [ 5 ] CVE-2022-22620 https://nvd.nist.gov/vuln/detail/CVE-2022-22620 [ 6 ] CVE-2022-22624 https://nvd.nist.gov/vuln/detail/CVE-2022-22624 [ 7 ] CVE-2022-22628 https://nvd.nist.gov/vuln/detail/CVE-2022-22628 [ 8 ] CVE-2022-22629 https://nvd.nist.gov/vuln/detail/CVE-2022-22629 [ 9 ] CVE-2022-22662 https://nvd.nist.gov/vuln/detail/CVE-2022-22662 [ 10 ] CVE-2022-22677 https://nvd.nist.gov/vuln/detail/CVE-2022-22677 [ 11 ] CVE-2022-26700 https://nvd.nist.gov/vuln/detail/CVE-2022-26700 [ 12 ] CVE-2022-26709 https://nvd.nist.gov/vuln/detail/CVE-2022-26709 [ 13 ] CVE-2022-26710 https://nvd.nist.gov/vuln/detail/CVE-2022-26710 [ 14 ] CVE-2022-26716 https://nvd.nist.gov/vuln/detail/CVE-2022-26716 [ 15 ] CVE-2022-26717 https://nvd.nist.gov/vuln/detail/CVE-2022-26717 [ 16 ] CVE-2022-26719 https://nvd.nist.gov/vuln/detail/CVE-2022-26719 [ 17 ] CVE-2022-30293 https://nvd.nist.gov/vuln/detail/CVE-2022-30293 [ 18 ] CVE-2022-30294 https://nvd.nist.gov/vuln/detail/CVE-2022-30294 [ 19 ] CVE-2022-32784 https://nvd.nist.gov/vuln/detail/CVE-2022-32784 [ 20 ] CVE-2022-32792 https://nvd.nist.gov/vuln/detail/CVE-2022-32792 [ 21 ] CVE-2022-32893 https://nvd.nist.gov/vuln/detail/CVE-2022-32893 [ 22 ] WSA-2022-0002 https://webkitgtk.org/security/WSA-2022-0002.html [ 23 ] WSA-2022-0003 https://webkitgtk.org/security/WSA-2022-0003.html [ 24 ] WSA-2022-0007 https://webkitgtk.org/security/WSA-2022-0007.html [ 25 ] WSA-2022-0008 https://webkitgtk.org/security/WSA-2022-0008.html
Availability
This GLSA and any updates to it are available for viewing at the Gentoo Security Website:
https://security.gentoo.org/glsa/202208-39
Concerns?
Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org.
License
Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s).
The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-202203-0131", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "macos", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "12.3" }, { "model": "watchos", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "8.5" }, { "model": "tvos", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "15.4" }, { "model": "ipad os", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "15.4" }, { "model": "safari", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "15.4" }, { "model": "macos", "scope": "gte", "trust": 1.0, "vendor": "apple", "version": "12.0" }, { "model": "iphone os", "scope": "lt", "trust": 1.0, "vendor": "apple", "version": "15.4" }, { "model": "ios", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "tvos", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "safari", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "macos", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "ipados", "scope": null, "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": null }, { "model": "watchos", "scope": "eq", "trust": 0.8, "vendor": "\u30a2\u30c3\u30d7\u30eb", "version": "8.5" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018495" }, { "db": "NVD", "id": "CVE-2022-22628" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Red Hat", "sources": [ { "db": "PACKETSTORM", "id": "171310" }, { "db": "PACKETSTORM", "id": "170759" }, { "db": "PACKETSTORM", "id": "171144" }, { "db": "PACKETSTORM", "id": "169760" }, { "db": "PACKETSTORM", "id": "170179" } ], "trust": 0.5 }, "cve": "CVE-2022-22628", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "nvd@nist.gov", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitabilityScore": 2.8, "id": "CVE-2022-22628", "impactScore": 5.9, "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 8.8, "baseSeverity": "High", "confidentialityImpact": "High", "exploitabilityScore": null, "id": "CVE-2022-22628", "impactScore": null, "integrityImpact": "High", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "Required", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" } ], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2022-22628", "trust": 1.0, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2022-22628", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-202203-1289", "trust": 0.6, "value": "HIGH" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018495" }, { "db": "CNNVD", "id": "CNNVD-202203-1289" }, { "db": "NVD", "id": "CVE-2022-22628" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A use after free issue was addressed with improved memory management. This issue is fixed in macOS Monterey 12.3, Safari 15.4, watchOS 8.5, iOS 15.4 and iPadOS 15.4, tvOS 15.4. Processing maliciously crafted web content may lead to arbitrary code execution. Safari , iPadOS , iOS Multiple Apple products contain a freed memory usage vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. \n\nFor the stable distribution (bullseye), these problems have been fixed in\nversion 2.36.0-2~deb11u1. \n\nWe recommend that you upgrade your wpewebkit packages. \n\nFor the detailed security status of wpewebkit please refer to\nits security tracker page at:\nhttps://security-tracker.debian.org/tracker/wpewebkit\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n-----BEGIN PGP SIGNATURE-----\n\niQIzBAEBCAAdFiEEYrwugQBKzlHMYFizAAyEYu0C2AIFAmJQSZIACgkQAAyEYu0C\n2AI87w//TosvtVmwYX78ws2AXV8/0oD2MeDvY2B6zdCzmyGxu0R3Nut+9dbr7Gxh\nO06+LiIkivR/ciijHi5OsWyoFL6XogGV5MDAR01u0mJpPhqc0cUCrMGW2N6hpw9D\nZtZnpXnwu+XRGCAfBDh6OIBxUIVEwxc+Br5ypOC8/FyCjlJFObM8+uFOjc4skpPx\n0XxRZy81ifhK6WctcdHAWMW1dcFGcf5qcsP4xSImXf5zNEkvyyD4bAYzB8EJxwhc\ngLzDVT8uZ27zSCSkMbPDcxEsH3vExY2yXtFo+fp6uz6nMUaMKfc4AZcljb5iABaL\n6w4R67tUZHR5z8nURMx+nEBgE0xk+fFHwfSXv5H9n0vJWewdxk8nigd2zinKhBPT\n8ZKJ+lowQS00Mj3oCaLG5rYya0zICzzGFYEfSYCglVCY8mQOZSN+4aD+I9+D1RCY\nSb9J7bLPLR9HqDPH7w9YxfeIUv9npB2PH0G39VuaFOKssVZnf9qrnxjPOi5oCryS\nypU3eQGILLd1/dF40YyPXXmb1oNC058Nx/9KGv/8A2o/INsoSjbKPJsub8UMARk5\nD+CApvrDAAruYs6Z6Wrt46+dlsSYk46SMo2Xo+2gHF/TQPii3LugA5gKBHk8JvR5\nPDURURtFHDbsgHbR2WaJKTdDUzQH3RHLeb2BfU7FEWIOusG+Azs=\n=RWku\n-----END PGP SIGNATURE-----\n. Summary:\n\nOpenShift API for Data Protection (OADP) 1.1.2 is now available. Description:\n\nOpenShift API for Data Protection (OADP) enables you to back up and restore\napplication resources, persistent volume data, and internal container\nimages to external backup storage. OADP enables both file system-based and\nsnapshot-based backups for persistent volumes. \n\nSecurity Fix(es) from Bugzilla:\n\n* golang: archive/tar: unbounded memory consumption when reading headers\n(CVE-2022-2879)\n\n* golang: net/http/httputil: ReverseProxy should not forward unparseable\nquery parameters (CVE-2022-2880)\n\n* golang: regexp/syntax: limit memory used by parsing regexps\n(CVE-2022-41715)\n\n* golang: net/http: An attacker can cause excessive memory growth in a Go\nserver accepting HTTP/2 requests (CVE-2022-41717)\n\nFor more details about the security issue(s), including the impact, a CVSS\nscore, and other related information, refer to the CVE page(s) listed in\nthe References section. Solution:\n\nBefore applying this update, make sure all previously released errata\nrelevant to your system have been applied. Bugs fixed (https://bugzilla.redhat.com/):\n\n2132867 - CVE-2022-2879 golang: archive/tar: unbounded memory consumption when reading headers\n2132868 - CVE-2022-2880 golang: net/http/httputil: ReverseProxy should not forward unparseable query parameters\n2132872 - CVE-2022-41715 golang: regexp/syntax: limit memory used by parsing regexps\n2161274 - CVE-2022-41717 golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nOADP-1056 - DPA fails validation if multiple BSLs have the same provider\nOADP-1150 - Handle docker env config changes in the oadp-operator\nOADP-1217 - update velero + restic to 1.9.5\nOADP-1256 - Backup stays in progress status after restic pod is restarted due to OOM killed\nOADP-1289 - Restore partially fails with error \"Secrets \\\"deployer-token-rrjqx\\\" not found\"\nOADP-290 - Remove creation/usage of velero-privileged SCC\n\n6. Bugs fixed (https://bugzilla.redhat.com/):\n\n2142707 - CVE-2022-42920 Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing\n\n5. Bugs fixed (https://bugzilla.redhat.com/):\n\n2134876 - CVE-2022-37601 loader-utils: prototype pollution in function parseQuery in parseQuery.js\n2140597 - CVE-2022-37603 loader-utils:Regular expression denial of service\n2142707 - CVE-2022-42920 Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing\n2150323 - CVE-2022-24999 express: \"qs\" prototype poisoning causes the hang of the node process\n2156263 - CVE-2022-46175 json5: Prototype Pollution in JSON5 via Parse Method\n2156324 - CVE-2021-35065 glob-parent: Regular Expression Denial of Service\n2156683 - CVE-2020-36567 gin: Unsanitized input in the default logger in github.com/gin-gonic/gin\n2161274 - CVE-2022-41717 golang: net/http: An attacker can cause excessive memory growth in a Go server accepting HTTP/2 requests\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nMTA-103 - MTA 6.0.1 Installation failed with CrashLoop Error for UI Pod\nMTA-106 - Implement ability for windup addon image pull policy to be configurable\nMTA-122 - MTA is upgrading automatically ignoring \u0027Manual\u0027 setting\nMTA-123 - MTA Becomes unusable when running bulk binary analysis\nMTA-127 - After upgrading MTA operator from 6.0.0 to 6.0.1 and running analysis , task pods starts failing \nMTA-131 - Analysis stops working after MTA upgrade from 6.0.0 to 6.0.1\nMTA-36 - Can\u0027t disable a proxy if it has an invalid configuration\nMTA-44 - Make RWX volumes optional. \nMTA-49 - Uploaded a local binary when return back to the page the UI should show green bar and correct %\nMTA-59 - Getting error 401 if deleting many credentials quickly\nMTA-65 - Set windup addon image pull policy to be controlled by the global image_pull_policy parameter\nMTA-72 - CVE-2022-46175 mta-ui-container: json5: Prototype Pollution in JSON5 via Parse Method [mta-6]\nMTA-73 - CVE-2022-37601 mta-ui-container: loader-utils: prototype pollution in function parseQuery in parseQuery.js [mta-6]\nMTA-74 - CVE-2020-36567 mta-windup-addon-container: gin: Unsanitized input in the default logger in github.com/gin-gonic/gin [mta-6]\nMTA-76 - CVE-2022-37603 mta-ui-container: loader-utils:Regular expression denial of service [mta-6]\nMTA-77 - CVE-2020-36567 mta-hub-container: gin: Unsanitized input in the default logger in github.com/gin-gonic/gin [mta-6]\nMTA-80 - CVE-2021-35065 mta-ui-container: glob-parent: Regular Expression Denial of Service [mta-6]\nMTA-82 - CVE-2022-42920 org.jboss.windup-windup-cli-parent: Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing [mta-6.0]\nMTA-85 - CVE-2022-24999 mta-ui-container: express: \"qs\" prototype poisoning causes the hang of the node process [mta-6]\nMTA-88 - CVE-2020-36567 mta-admin-addon-container: gin: Unsanitized input in the default logger in github.com/gin-gonic/gin [mta-6]\nMTA-92 - CVE-2022-42920 org.jboss.windup.plugin-windup-maven-plugin-parent: Apache-Commons-BCEL: arbitrary bytecode produced via out-of-bounds writing [mta-6.0]\nMTA-96 - [UI] Maven -\u003e \"Local artifact repository\" textbox can be checked and has no tooltip\n\n6. -----BEGIN PGP SIGNED MESSAGE-----\nHash: SHA256\n\n==================================================================== \nRed Hat Security Advisory\n\nSynopsis: Moderate: webkit2gtk3 security and bug fix update\nAdvisory ID: RHSA-2022:7704-01\nProduct: Red Hat Enterprise Linux\nAdvisory URL: https://access.redhat.com/errata/RHSA-2022:7704\nIssue date: 2022-11-08\nCVE Names: CVE-2022-22624 CVE-2022-22628 CVE-2022-22629\n CVE-2022-22662 CVE-2022-26700 CVE-2022-26709\n CVE-2022-26710 CVE-2022-26716 CVE-2022-26717\n CVE-2022-26719 CVE-2022-30293\n====================================================================\n1. Summary:\n\nAn update for glib2 and webkit2gtk3 is now available for Red Hat Enterprise\nLinux 8. \n\nRed Hat Product Security has rated this update as having a security impact\nof Moderate. A Common Vulnerability Scoring System (CVSS) base score, which\ngives a detailed severity rating, is available for each vulnerability from\nthe CVE link(s) in the References section. \n\n2. Relevant releases/architectures:\n\nRed Hat CodeReady Linux Builder (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64\nRed Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64\n\n3. Description:\n\nWebKitGTK is the port of the portable web rendering engine WebKit to the\nGTK platform. \n\nGLib provides the core application building blocks for libraries and\napplications written in C. It provides the core object system used in\nGNOME, the main loop implementation, and a large set of utility functions\nfor strings and common data structures. \n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat\nEnterprise Linux 8.7 Release Notes linked from the References section. \n\n4. Solution:\n\nFor details on how to apply this update, which includes the changes\ndescribed in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\n5. Package List:\n\nRed Hat Enterprise Linux AppStream (v. 8):\n\nSource:\nwebkit2gtk3-2.36.7-1.el8.src.rpm\n\naarch64:\nwebkit2gtk3-2.36.7-1.el8.aarch64.rpm\nwebkit2gtk3-debuginfo-2.36.7-1.el8.aarch64.rpm\nwebkit2gtk3-debugsource-2.36.7-1.el8.aarch64.rpm\nwebkit2gtk3-devel-2.36.7-1.el8.aarch64.rpm\nwebkit2gtk3-devel-debuginfo-2.36.7-1.el8.aarch64.rpm\nwebkit2gtk3-jsc-2.36.7-1.el8.aarch64.rpm\nwebkit2gtk3-jsc-debuginfo-2.36.7-1.el8.aarch64.rpm\nwebkit2gtk3-jsc-devel-2.36.7-1.el8.aarch64.rpm\nwebkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8.aarch64.rpm\n\nppc64le:\nwebkit2gtk3-2.36.7-1.el8.ppc64le.rpm\nwebkit2gtk3-debuginfo-2.36.7-1.el8.ppc64le.rpm\nwebkit2gtk3-debugsource-2.36.7-1.el8.ppc64le.rpm\nwebkit2gtk3-devel-2.36.7-1.el8.ppc64le.rpm\nwebkit2gtk3-devel-debuginfo-2.36.7-1.el8.ppc64le.rpm\nwebkit2gtk3-jsc-2.36.7-1.el8.ppc64le.rpm\nwebkit2gtk3-jsc-debuginfo-2.36.7-1.el8.ppc64le.rpm\nwebkit2gtk3-jsc-devel-2.36.7-1.el8.ppc64le.rpm\nwebkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8.ppc64le.rpm\n\ns390x:\nwebkit2gtk3-2.36.7-1.el8.s390x.rpm\nwebkit2gtk3-debuginfo-2.36.7-1.el8.s390x.rpm\nwebkit2gtk3-debugsource-2.36.7-1.el8.s390x.rpm\nwebkit2gtk3-devel-2.36.7-1.el8.s390x.rpm\nwebkit2gtk3-devel-debuginfo-2.36.7-1.el8.s390x.rpm\nwebkit2gtk3-jsc-2.36.7-1.el8.s390x.rpm\nwebkit2gtk3-jsc-debuginfo-2.36.7-1.el8.s390x.rpm\nwebkit2gtk3-jsc-devel-2.36.7-1.el8.s390x.rpm\nwebkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8.s390x.rpm\n\nx86_64:\nwebkit2gtk3-2.36.7-1.el8.i686.rpm\nwebkit2gtk3-2.36.7-1.el8.x86_64.rpm\nwebkit2gtk3-debuginfo-2.36.7-1.el8.i686.rpm\nwebkit2gtk3-debuginfo-2.36.7-1.el8.x86_64.rpm\nwebkit2gtk3-debugsource-2.36.7-1.el8.i686.rpm\nwebkit2gtk3-debugsource-2.36.7-1.el8.x86_64.rpm\nwebkit2gtk3-devel-2.36.7-1.el8.i686.rpm\nwebkit2gtk3-devel-2.36.7-1.el8.x86_64.rpm\nwebkit2gtk3-devel-debuginfo-2.36.7-1.el8.i686.rpm\nwebkit2gtk3-devel-debuginfo-2.36.7-1.el8.x86_64.rpm\nwebkit2gtk3-jsc-2.36.7-1.el8.i686.rpm\nwebkit2gtk3-jsc-2.36.7-1.el8.x86_64.rpm\nwebkit2gtk3-jsc-debuginfo-2.36.7-1.el8.i686.rpm\nwebkit2gtk3-jsc-debuginfo-2.36.7-1.el8.x86_64.rpm\nwebkit2gtk3-jsc-devel-2.36.7-1.el8.i686.rpm\nwebkit2gtk3-jsc-devel-2.36.7-1.el8.x86_64.rpm\nwebkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8.i686.rpm\nwebkit2gtk3-jsc-devel-debuginfo-2.36.7-1.el8.x86_64.rpm\n\nRed Hat Enterprise Linux BaseOS (v. 8):\n\nSource:\nglib2-2.56.4-159.el8.src.rpm\n\naarch64:\nglib2-2.56.4-159.el8.aarch64.rpm\nglib2-debuginfo-2.56.4-159.el8.aarch64.rpm\nglib2-debugsource-2.56.4-159.el8.aarch64.rpm\nglib2-devel-2.56.4-159.el8.aarch64.rpm\nglib2-devel-debuginfo-2.56.4-159.el8.aarch64.rpm\nglib2-fam-2.56.4-159.el8.aarch64.rpm\nglib2-fam-debuginfo-2.56.4-159.el8.aarch64.rpm\nglib2-tests-2.56.4-159.el8.aarch64.rpm\nglib2-tests-debuginfo-2.56.4-159.el8.aarch64.rpm\n\nppc64le:\nglib2-2.56.4-159.el8.ppc64le.rpm\nglib2-debuginfo-2.56.4-159.el8.ppc64le.rpm\nglib2-debugsource-2.56.4-159.el8.ppc64le.rpm\nglib2-devel-2.56.4-159.el8.ppc64le.rpm\nglib2-devel-debuginfo-2.56.4-159.el8.ppc64le.rpm\nglib2-fam-2.56.4-159.el8.ppc64le.rpm\nglib2-fam-debuginfo-2.56.4-159.el8.ppc64le.rpm\nglib2-tests-2.56.4-159.el8.ppc64le.rpm\nglib2-tests-debuginfo-2.56.4-159.el8.ppc64le.rpm\n\ns390x:\nglib2-2.56.4-159.el8.s390x.rpm\nglib2-debuginfo-2.56.4-159.el8.s390x.rpm\nglib2-debugsource-2.56.4-159.el8.s390x.rpm\nglib2-devel-2.56.4-159.el8.s390x.rpm\nglib2-devel-debuginfo-2.56.4-159.el8.s390x.rpm\nglib2-fam-2.56.4-159.el8.s390x.rpm\nglib2-fam-debuginfo-2.56.4-159.el8.s390x.rpm\nglib2-tests-2.56.4-159.el8.s390x.rpm\nglib2-tests-debuginfo-2.56.4-159.el8.s390x.rpm\n\nx86_64:\nglib2-2.56.4-159.el8.i686.rpm\nglib2-2.56.4-159.el8.x86_64.rpm\nglib2-debuginfo-2.56.4-159.el8.i686.rpm\nglib2-debuginfo-2.56.4-159.el8.x86_64.rpm\nglib2-debugsource-2.56.4-159.el8.i686.rpm\nglib2-debugsource-2.56.4-159.el8.x86_64.rpm\nglib2-devel-2.56.4-159.el8.i686.rpm\nglib2-devel-2.56.4-159.el8.x86_64.rpm\nglib2-devel-debuginfo-2.56.4-159.el8.i686.rpm\nglib2-devel-debuginfo-2.56.4-159.el8.x86_64.rpm\nglib2-fam-2.56.4-159.el8.x86_64.rpm\nglib2-fam-debuginfo-2.56.4-159.el8.i686.rpm\nglib2-fam-debuginfo-2.56.4-159.el8.x86_64.rpm\nglib2-tests-2.56.4-159.el8.x86_64.rpm\nglib2-tests-debuginfo-2.56.4-159.el8.i686.rpm\nglib2-tests-debuginfo-2.56.4-159.el8.x86_64.rpm\n\nRed Hat CodeReady Linux Builder (v. 8):\n\naarch64:\nglib2-debuginfo-2.56.4-159.el8.aarch64.rpm\nglib2-debugsource-2.56.4-159.el8.aarch64.rpm\nglib2-devel-debuginfo-2.56.4-159.el8.aarch64.rpm\nglib2-fam-debuginfo-2.56.4-159.el8.aarch64.rpm\nglib2-static-2.56.4-159.el8.aarch64.rpm\nglib2-tests-debuginfo-2.56.4-159.el8.aarch64.rpm\n\nnoarch:\nglib2-doc-2.56.4-159.el8.noarch.rpm\n\nppc64le:\nglib2-debuginfo-2.56.4-159.el8.ppc64le.rpm\nglib2-debugsource-2.56.4-159.el8.ppc64le.rpm\nglib2-devel-debuginfo-2.56.4-159.el8.ppc64le.rpm\nglib2-fam-debuginfo-2.56.4-159.el8.ppc64le.rpm\nglib2-static-2.56.4-159.el8.ppc64le.rpm\nglib2-tests-debuginfo-2.56.4-159.el8.ppc64le.rpm\n\ns390x:\nglib2-debuginfo-2.56.4-159.el8.s390x.rpm\nglib2-debugsource-2.56.4-159.el8.s390x.rpm\nglib2-devel-debuginfo-2.56.4-159.el8.s390x.rpm\nglib2-fam-debuginfo-2.56.4-159.el8.s390x.rpm\nglib2-static-2.56.4-159.el8.s390x.rpm\nglib2-tests-debuginfo-2.56.4-159.el8.s390x.rpm\n\nx86_64:\nglib2-debuginfo-2.56.4-159.el8.i686.rpm\nglib2-debuginfo-2.56.4-159.el8.x86_64.rpm\nglib2-debugsource-2.56.4-159.el8.i686.rpm\nglib2-debugsource-2.56.4-159.el8.x86_64.rpm\nglib2-devel-debuginfo-2.56.4-159.el8.i686.rpm\nglib2-devel-debuginfo-2.56.4-159.el8.x86_64.rpm\nglib2-fam-debuginfo-2.56.4-159.el8.i686.rpm\nglib2-fam-debuginfo-2.56.4-159.el8.x86_64.rpm\nglib2-static-2.56.4-159.el8.i686.rpm\nglib2-static-2.56.4-159.el8.x86_64.rpm\nglib2-tests-debuginfo-2.56.4-159.el8.i686.rpm\nglib2-tests-debuginfo-2.56.4-159.el8.x86_64.rpm\n\nThese packages are GPG signed by Red Hat for security. Our key and\ndetails on how to verify the signature are available from\nhttps://access.redhat.com/security/team/key/\n\n7. References:\n\nhttps://access.redhat.com/security/cve/CVE-2022-22624\nhttps://access.redhat.com/security/cve/CVE-2022-22628\nhttps://access.redhat.com/security/cve/CVE-2022-22629\nhttps://access.redhat.com/security/cve/CVE-2022-22662\nhttps://access.redhat.com/security/cve/CVE-2022-26700\nhttps://access.redhat.com/security/cve/CVE-2022-26709\nhttps://access.redhat.com/security/cve/CVE-2022-26710\nhttps://access.redhat.com/security/cve/CVE-2022-26716\nhttps://access.redhat.com/security/cve/CVE-2022-26717\nhttps://access.redhat.com/security/cve/CVE-2022-26719\nhttps://access.redhat.com/security/cve/CVE-2022-30293\nhttps://access.redhat.com/security/updates/classification/#moderate\nhttps://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index\n\n8. Contact:\n\nThe Red Hat security contact is \u003csecalert@redhat.com\u003e. More contact\ndetails at https://access.redhat.com/security/team/contact/\n\nCopyright 2022 Red Hat, Inc. \n-----BEGIN PGP SIGNATURE-----\nVersion: GnuPG v1\n\niQIVAwUBY2pSR9zjgjWX9erEAQiQFQ//YREiZYxfs4xndA0wPNv+fq6qubz4ht3h\nFycNYUUhtiB+KqnpXfelECae9VC+jtDaBqrmopN4kGYPERbIBNOaxDM/AjiwQoRy\nWAMPMG0Nf7bES6RH793l9a36dPezHS7FQymSw1UsWgiFLEzalcP41UhJmz2ehhnF\n89oC3QQ831rCFn637hiTMFkaOMhQsR+P7iCnpDXEA9f3jadtWkMk+ALkddEGR+zr\nbbCVMi3vd4q1w854SOU0mZjdBXd3JKcBFq5Iux1gY6XVDCilgU6QgZaltJJQx2u6\nJ3qGFykmSwgoCfvz2QUBMH5x3gYJHknfa1CrqgOtOC5gpO9ChEyRg7T5aC/mpY4P\nkfFh0VJEOZS29b34KOlKvXCRbgDjvuBy8EHvqJCs29a9ISOWOpZ8qsLDjTMBk+MR\nAU+J3Ym3ZiRaQhpFDDSakcuub0DAHESbokIsTHlsOt8J80GspJod3GRl2BUfY4FH\nuVH6t7IIL0k6zL/1si7cEnT1uMxp7rPh70KPSG0hm2CHrJ6MOLt9D6/eAuj7xAEL\nvkxev1kJ28kXoovVYmylhcjxX4w6v1M9QGE7IBMFEnFDi6btyWNDjD1vLGvmbuIT\niJ120wnUt3kGH0vMLO2+Rfwj7jYVyR08tTY8JDtrxbhrUThjhJ9GCTLg3s+MaYVk\nJ8NwK2xt2AQ=vhlq\n-----END PGP SIGNATURE-----\n--\nRHSA-announce mailing list\nRHSA-announce@redhat.com\nhttps://listman.redhat.com/mailman/listinfo/rhsa-announce\n. Bugs fixed (https://bugzilla.redhat.com/):\n\n2064698 - CVE-2020-36518 jackson-databind: denial of service via a large depth of nested objects\n2135244 - CVE-2022-42003 jackson-databind: deep wrapper array nesting wrt UNWRAP_SINGLE_VALUE_ARRAYS\n2135247 - CVE-2022-42004 jackson-databind: use of deeply nested arrays\n\n5. JIRA issues fixed (https://issues.jboss.org/):\n\nLOG-3293 - log-file-metric-exporter container has not limits exhausting the resources of the node\n\n6. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\nGentoo Linux Security Advisory GLSA 202208-39\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n https://security.gentoo.org/\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\n Severity: High\n Title: WebKitGTK+: Multiple Vulnerabilities\n Date: August 31, 2022\n Bugs: #866494, #864427, #856445, #861740, #837305, #845252, #839984, #833568, #832990\n ID: 202208-39\n\n- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -\n\nSynopsis\n=======\nMultiple vulnerabilities have been found in WebkitGTK+, the worst of\nwhich could result in the arbitrary execution of code. \n\nAffected packages\n================\n -------------------------------------------------------------------\n Package / Vulnerable / Unaffected\n -------------------------------------------------------------------\n 1 net-libs/webkit-gtk \u003c 2.36.7 \u003e= 2.36.7\n\nDescription\n==========\nMultiple vulnerabilities have been discovered in WebKitGTK+. Please\nreview the CVE identifiers referenced below for details. \n\nImpact\n=====\nPlease review the referenced CVE identifiers for details. \n\nWorkaround\n=========\nThere is no known workaround at this time. \n\nResolution\n=========\nAll WebKitGTK+ users should upgrade to the latest version:\n\n # emerge --sync\n # emerge --ask --oneshot --verbose \"\u003e=net-libs/webkit-gtk-2.36.7\"\n\nReferences\n=========\n[ 1 ] CVE-2022-2294\n https://nvd.nist.gov/vuln/detail/CVE-2022-2294\n[ 2 ] CVE-2022-22589\n https://nvd.nist.gov/vuln/detail/CVE-2022-22589\n[ 3 ] CVE-2022-22590\n https://nvd.nist.gov/vuln/detail/CVE-2022-22590\n[ 4 ] CVE-2022-22592\n https://nvd.nist.gov/vuln/detail/CVE-2022-22592\n[ 5 ] CVE-2022-22620\n https://nvd.nist.gov/vuln/detail/CVE-2022-22620\n[ 6 ] CVE-2022-22624\n https://nvd.nist.gov/vuln/detail/CVE-2022-22624\n[ 7 ] CVE-2022-22628\n https://nvd.nist.gov/vuln/detail/CVE-2022-22628\n[ 8 ] CVE-2022-22629\n https://nvd.nist.gov/vuln/detail/CVE-2022-22629\n[ 9 ] CVE-2022-22662\n https://nvd.nist.gov/vuln/detail/CVE-2022-22662\n[ 10 ] CVE-2022-22677\n https://nvd.nist.gov/vuln/detail/CVE-2022-22677\n[ 11 ] CVE-2022-26700\n https://nvd.nist.gov/vuln/detail/CVE-2022-26700\n[ 12 ] CVE-2022-26709\n https://nvd.nist.gov/vuln/detail/CVE-2022-26709\n[ 13 ] CVE-2022-26710\n https://nvd.nist.gov/vuln/detail/CVE-2022-26710\n[ 14 ] CVE-2022-26716\n https://nvd.nist.gov/vuln/detail/CVE-2022-26716\n[ 15 ] CVE-2022-26717\n https://nvd.nist.gov/vuln/detail/CVE-2022-26717\n[ 16 ] CVE-2022-26719\n https://nvd.nist.gov/vuln/detail/CVE-2022-26719\n[ 17 ] CVE-2022-30293\n https://nvd.nist.gov/vuln/detail/CVE-2022-30293\n[ 18 ] CVE-2022-30294\n https://nvd.nist.gov/vuln/detail/CVE-2022-30294\n[ 19 ] CVE-2022-32784\n https://nvd.nist.gov/vuln/detail/CVE-2022-32784\n[ 20 ] CVE-2022-32792\n https://nvd.nist.gov/vuln/detail/CVE-2022-32792\n[ 21 ] CVE-2022-32893\n https://nvd.nist.gov/vuln/detail/CVE-2022-32893\n[ 22 ] WSA-2022-0002\n https://webkitgtk.org/security/WSA-2022-0002.html\n[ 23 ] WSA-2022-0003\n https://webkitgtk.org/security/WSA-2022-0003.html\n[ 24 ] WSA-2022-0007\n https://webkitgtk.org/security/WSA-2022-0007.html\n[ 25 ] WSA-2022-0008\n https://webkitgtk.org/security/WSA-2022-0008.html\n\nAvailability\n===========\nThis GLSA and any updates to it are available for viewing at\nthe Gentoo Security Website:\n\n https://security.gentoo.org/glsa/202208-39\n\nConcerns?\n========\nSecurity is a primary focus of Gentoo Linux and ensuring the\nconfidentiality and security of our users\u0027 machines is of utmost\nimportance to us. Any security concerns should be addressed to\nsecurity@gentoo.org or alternatively, you may file a bug at\nhttps://bugs.gentoo.org. \n\nLicense\n======\nCopyright 2022 Gentoo Foundation, Inc; referenced text\nbelongs to its owner(s). \n\nThe contents of this document are licensed under the\nCreative Commons - Attribution / Share Alike license. \n\nhttps://creativecommons.org/licenses/by-sa/2.5\n", "sources": [ { "db": "NVD", "id": "CVE-2022-22628" }, { "db": "JVNDB", "id": "JVNDB-2022-018495" }, { "db": "VULHUB", "id": "VHN-411256" }, { "db": "PACKETSTORM", "id": "169374" }, { "db": "PACKETSTORM", "id": "171310" }, { "db": "PACKETSTORM", "id": "170759" }, { "db": "PACKETSTORM", "id": "171144" }, { "db": "PACKETSTORM", "id": "169760" }, { "db": "PACKETSTORM", "id": "170179" }, { "db": "PACKETSTORM", "id": "168226" } ], "trust": 2.34 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2022-22628", "trust": 4.0 }, { "db": "PACKETSTORM", "id": "168226", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "169760", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2022-018495", "trust": 0.8 }, { "db": "PACKETSTORM", "id": "170210", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "170956", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "169920", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "170806", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "166317", "trust": 0.7 }, { "db": "PACKETSTORM", "id": "169889", "trust": 0.7 }, { "db": "CS-HELP", "id": "SB2022031439", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022042820", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022041915", "trust": 0.6 }, { "db": "CS-HELP", "id": "SB2022031602", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.6434", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2023.0818", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2023.1467", "trust": 0.6 }, { "db": "AUSCERT", "id": "ESB-2022.6290", "trust": 0.6 }, { "db": "CNNVD", "id": "CNNVD-202203-1289", "trust": 0.6 }, { "db": "PACKETSTORM", "id": "171144", "trust": 0.2 }, { "db": "PACKETSTORM", "id": "166318", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "166316", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "171026", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "170898", "trust": 0.1 }, { "db": "VULHUB", "id": "VHN-411256", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "169374", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "171310", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "170759", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "170179", "trust": 0.1 } ], "sources": [ { "db": "VULHUB", "id": "VHN-411256" }, { "db": "JVNDB", "id": "JVNDB-2022-018495" }, { "db": "PACKETSTORM", "id": "169374" }, { "db": "PACKETSTORM", "id": "171310" }, { "db": "PACKETSTORM", "id": "170759" }, { "db": "PACKETSTORM", "id": "171144" }, { "db": "PACKETSTORM", "id": "169760" }, { "db": "PACKETSTORM", "id": "170179" }, { "db": "PACKETSTORM", "id": "168226" }, { "db": "CNNVD", "id": "CNNVD-202203-1289" }, { "db": "NVD", "id": "CVE-2022-22628" } ] }, "id": "VAR-202203-0131", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-411256" } ], "trust": 0.01 }, "last_update_date": "2024-11-29T22:07:13.242000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "HT213187 Apple\u00a0 Security update", "trust": 0.8, "url": "https://support.apple.com/en-us/HT213182" }, { "title": "Apple iOS and Apple iPadOS Remediation of resource management error vulnerabilities", "trust": 0.6, "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=185787" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018495" }, { "db": "CNNVD", "id": "CNNVD-202203-1289" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-416", "trust": 1.1 }, { "problemtype": "Use of freed memory (CWE-416) [NVD evaluation ]", "trust": 0.8 } ], "sources": [ { "db": "VULHUB", "id": "VHN-411256" }, { "db": "JVNDB", "id": "JVNDB-2022-018495" }, { "db": "NVD", "id": "CVE-2022-22628" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.3, "url": "https://support.apple.com/en-us/ht213182" }, { "trust": 2.3, "url": "https://support.apple.com/en-us/ht213187" }, { "trust": 1.7, "url": "https://support.apple.com/en-us/ht213183" }, { "trust": 1.7, "url": "https://support.apple.com/en-us/ht213186" }, { "trust": 1.7, "url": "https://support.apple.com/en-us/ht213193" }, { "trust": 1.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22628" }, { "trust": 1.1, "url": "https://access.redhat.com/security/cve/cve-2022-22628" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/170210/red-hat-security-advisory-2022-8964-01.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022031439" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/170806/red-hat-security-advisory-2023-0542-01.html" }, { "trust": 0.6, "url": "https://cxsecurity.com/cveshow/cve-2022-22628/" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/168226/gentoo-linux-security-advisory-202208-39.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/169920/red-hat-security-advisory-2022-7435-01.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2023.1467" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.6290" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022042820" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/webkitgtk-wpe-webkit-four-vulnerabilities-38003" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/169889/red-hat-security-advisory-2022-8054-01.html" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022041915" }, { "trust": 0.6, "url": "https://vigilance.fr/vulnerability/apple-ios-macos-multiple-vulnerabilities-37800" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/166317/apple-security-advisory-2022-03-14-1.html" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2022.6434" }, { "trust": 0.6, "url": "https://www.cybersecurity-help.cz/vdb/sb2022031602" }, { "trust": 0.6, "url": "https://www.auscert.org.au/bulletins/esb-2023.0818" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/170956/red-hat-security-advisory-2023-0709-01.html" }, { "trust": 0.6, "url": "https://packetstormsecurity.com/files/169760/red-hat-security-advisory-2022-7704-01.html" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22624" }, { "trust": 0.5, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22629" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2022-22662" }, { "trust": 0.5, "url": "https://access.redhat.com/security/team/contact/" }, { "trust": 0.5, "url": "https://listman.redhat.com/mailman/listinfo/rhsa-announce" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2022-26710" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2022-26700" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2022-26719" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2022-26709" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2022-26717" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2022-26716" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2022-22629" }, { "trust": 0.5, "url": "https://bugzilla.redhat.com/):" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2022-22624" }, { "trust": 0.5, "url": "https://access.redhat.com/security/cve/cve-2022-30293" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2022-27404" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2022-42898" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2022-1304" }, { "trust": 0.4, "url": "https://access.redhat.com/articles/11258" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2022-27405" }, { "trust": 0.4, "url": "https://access.redhat.com/security/cve/cve-2022-27406" }, { "trust": 0.4, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22662" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2022-25308" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-1304" }, { "trust": 0.3, "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2022-25310" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2022-25309" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2022-35737" }, { "trust": 0.3, "url": "https://access.redhat.com/security/cve/cve-2021-46848" }, { "trust": 0.3, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-46848" }, { "trust": 0.3, "url": "https://issues.jboss.org/):" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-43680" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-2953" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-42011" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-2869" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-2058" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-40304" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-2057" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-2058" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-41717" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-2521" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-2519" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-40303" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-2056" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-2056" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-42010" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-2868" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-2520" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-47629" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-42012" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-2867" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-2519" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-2057" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0865" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-1355" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-0909" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-0924" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0561" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-0908" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-0561" }, { "trust": 0.2, "url": "https://access.redhat.com/security/updates/classification/#important" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-35527" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-0865" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-0562" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-42920" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-2509" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-37434" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0562" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-22844" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-35527" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2016-3709" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-35525" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2016-3709" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2020-35525" }, { "trust": 0.2, "url": "https://access.redhat.com/security/cve/cve-2022-0891" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26719" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-30293" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26700" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26716" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26717" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26709" }, { "trust": 0.2, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-26710" }, { "trust": 0.1, "url": "https://www.debian.org/security/faq" }, { "trust": 0.1, "url": "https://security-tracker.debian.org/tracker/wpewebkit" }, { "trust": 0.1, "url": "https://www.debian.org/security/" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-46285" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-48303" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-2879" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-2880" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-4415" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2023:1174" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-4883" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-44617" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-2521" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-2520" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-41715" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-1122" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-1122" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-25308" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0891" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0908" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-1471" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0924" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2023:0470" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-1355" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0909" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-1471" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-35065" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-3775" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-23521" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-37603" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-35065" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2023-21835" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-41903" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-24999" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-23521" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2023-21843" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-46175" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2023:0934" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-24999" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-36567" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-37601" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-3787" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-2601" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2023-21830" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36567" }, { "trust": 0.1, "url": "https://access.redhat.com/security/team/key/" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2022:7704" }, { "trust": 0.1, "url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.7_release_notes/index" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36516" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-24448" }, { "trust": 0.1, "url": "https://access.redhat.com/errata/rhsa-2022:8889" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-21618" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-3515" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0168" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-21628" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0617" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-2639" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-1055" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-2068" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-2097" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-26373" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-20368" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-1048" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3640" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-0617" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-39399" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-0854" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-upgrading.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-29581" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-1016" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-2078" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-2938" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-21499" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-1927" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-36946" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-42003" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-1897" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-36558" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-1852" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-0854" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-0168" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-21624" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-1785" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-21626" }, { "trust": 0.1, "url": "https://docs.openshift.com/container-platform/4.9/logging/cluster-logging-release-notes.html" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-28390" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36558" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-1586" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2021-30002" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-36518" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-27950" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-2586" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-23960" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-3640" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2021-30002" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36518" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-1184" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-25255" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-34903" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-21619" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-42004" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-1292" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2020-36516" }, { "trust": 0.1, "url": "https://access.redhat.com/security/cve/cve-2022-28893" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22620" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22589" }, { "trust": 0.1, "url": "https://bugs.gentoo.org." }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22677" }, { "trust": 0.1, "url": "https://creativecommons.org/licenses/by-sa/2.5" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-2294" }, { "trust": 0.1, "url": "https://webkitgtk.org/security/wsa-2022-0008.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-30294" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22590" }, { "trust": 0.1, "url": "https://security.gentoo.org/" }, { "trust": 0.1, "url": "https://webkitgtk.org/security/wsa-2022-0002.html" }, { "trust": 0.1, "url": "https://security.gentoo.org/glsa/202208-39" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-22592" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32893" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32792" }, { "trust": 0.1, "url": "https://webkitgtk.org/security/wsa-2022-0003.html" }, { "trust": 0.1, "url": "https://nvd.nist.gov/vuln/detail/cve-2022-32784" }, { "trust": 0.1, "url": "https://webkitgtk.org/security/wsa-2022-0007.html" } ], "sources": [ { "db": "VULHUB", "id": "VHN-411256" }, { "db": "JVNDB", "id": "JVNDB-2022-018495" }, { "db": "PACKETSTORM", "id": "169374" }, { "db": "PACKETSTORM", "id": "171310" }, { "db": "PACKETSTORM", "id": "170759" }, { "db": "PACKETSTORM", "id": "171144" }, { "db": "PACKETSTORM", "id": "169760" }, { "db": "PACKETSTORM", "id": "170179" }, { "db": "PACKETSTORM", "id": "168226" }, { "db": "CNNVD", "id": "CNNVD-202203-1289" }, { "db": "NVD", "id": "CVE-2022-22628" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "VULHUB", "id": "VHN-411256" }, { "db": "JVNDB", "id": "JVNDB-2022-018495" }, { "db": "PACKETSTORM", "id": "169374" }, { "db": "PACKETSTORM", "id": "171310" }, { "db": "PACKETSTORM", "id": "170759" }, { "db": "PACKETSTORM", "id": "171144" }, { "db": "PACKETSTORM", "id": "169760" }, { "db": "PACKETSTORM", "id": "170179" }, { "db": "PACKETSTORM", "id": "168226" }, { "db": "CNNVD", "id": "CNNVD-202203-1289" }, { "db": "NVD", "id": "CVE-2022-22628" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-23T00:00:00", "db": "VULHUB", "id": "VHN-411256" }, { "date": "2023-10-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2022-018495" }, { "date": "2022-04-28T19:12:00", "db": "PACKETSTORM", "id": "169374" }, { "date": "2023-03-09T15:14:10", "db": "PACKETSTORM", "id": "171310" }, { "date": "2023-01-27T15:03:38", "db": "PACKETSTORM", "id": "170759" }, { "date": "2023-02-28T16:03:55", "db": "PACKETSTORM", "id": "171144" }, { "date": "2022-11-08T13:47:18", "db": "PACKETSTORM", "id": "169760" }, { "date": "2022-12-09T14:52:40", "db": "PACKETSTORM", "id": "170179" }, { "date": "2022-09-01T16:33:44", "db": "PACKETSTORM", "id": "168226" }, { "date": "2022-03-14T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-1289" }, { "date": "2022-09-23T19:15:11.080000", "db": "NVD", "id": "CVE-2022-22628" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2022-09-28T00:00:00", "db": "VULHUB", "id": "VHN-411256" }, { "date": "2023-10-20T03:19:00", "db": "JVNDB", "id": "JVNDB-2022-018495" }, { "date": "2023-03-10T00:00:00", "db": "CNNVD", "id": "CNNVD-202203-1289" }, { "date": "2022-09-28T12:06:47.677000", "db": "NVD", "id": "CVE-2022-22628" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-1289" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Freed memory usage vulnerability in multiple Apple products", "sources": [ { "db": "JVNDB", "id": "JVNDB-2022-018495" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-202203-1289" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.